Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Cyber Defenses for Botnet Detection and Mitigation., , , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Classifying Human-Generated and AI-Generated Election Claims in Social Media., , , , and . CoRR, (2024)FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers., and . CVIP (1), volume 1376 of Communications in Computer and Information Science, page 500-511. Springer, (2020)Vulnerability Metrics for Graph-based Configuration Security., , , , and . SECRYPT, page 259-270. SCITEPRESS, (2021)A Formal Model for Credential Hopping Attacks., , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 367-386. Springer, (2022)Towards Usable Scoring of Common Weaknesses., and . SECRYPT, page 183-191. SCITEPRESS, (2023)2014 Index IEEE Transactions on Knowledge and Data Engineering Vol. 26, , , , , , , , , and . IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 27 (1): 289 (2015)SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , and . CNS, page 1-10. IEEE, (2020)A web personalization system based on web usage mining techniques., , , and . WWW (Alternate Track Papers & Posters), page 288-289. ACM, (2004)From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.. From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 1-23. Springer, (2018)