Author of the publication

1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.

, , , , , and . WSDM, page 823-824. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response., , , , and . ICS-CSR, BCS, (2015)POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 700-704. Springer, (2023)CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms., , , and . PerCom Workshops, page 282-284. IEEE, (2023)Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks., , and . SafeConfig@CCS, page 15-20. ACM, (2015)A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud., , , , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-325. (2015)Scaling Archived Social Media Data Analysis Using a Hadoop Cloud., , , and . IEEE CLOUD, page 685-692. IEEE Computer Society, (2013)A Grid-Enabled Security Framework for Collaborative Virtual Organisations., , , , , and . Virtual Enterprises and Collaborative Networks, volume 149 of IFIP, page 415-422. Kluwer/springer, (2004)Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals., , , , , , and . J. Cybersecur. Priv., 4 (2): 340-356 (June 2024)Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection., , , , and . CoRR, (2023)Analysing the connectivity and communication of suicidal users on twitter., , , and . Comput. Commun., (2016)