Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimension Reduction Using Active Manifolds., , and . CoRR, (2018)GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection., , , , and . CISRC, page 15:1-15:4. ACM, (2016)AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors., , , , , , , , , and 4 other author(s). IEEE Big Data, page 1620-1629. IEEE, (2023)What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity., , , and . CoRR, (2021)Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version)., , , , and . CoRR, (2018)A Survey of Intrusion Detection Systems Leveraging Host Data., , , , and . CoRR, (2018)Testing SOAR tools in use., , , , , , , , , and 4 other author(s). Comput. Secur., (June 2023)Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection., , , and . VTC Fall, page 1-5. IEEE, (2018)D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation., , , , and . CSET @ USENIX Security Symposium, page 17-26. ACM, (2021)Active Manifolds: A non-linear analogue to Active Subspaces., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 764-772. PMLR, (2019)