Author of the publication

Data-Driven Field Mapping of Security Logs for Integrated Monitoring.

, , , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 253-268. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Detection of Electric Field Signal of a Moving Object Using Adjustable Frequency Bands and Statistical Discriminant for Underwater Defense., , and . IEEE Trans. Geosci. Remote. Sens., (2022)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , and . IMIS, page 287-290. IEEE Computer Society, (2014)Effective and efficient detection of software theft via dynamic API authority vectors., , , and . J. Syst. Softw., (2015)Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances., , , , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 197-204. Springer, (2019)A Static Birthmark of Windows Binary Executables Based on Strings., , , , , , and . IMIS, page 734-738. IEEE Computer Society, (2013)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , and . RACS, page 114-118. ACM, (2015)Data-Driven Field Mapping of Security Logs for Integrated Monitoring., , , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 253-268. Springer, (2019)Efficient Identification of Windows Executable Programs to Prevent Software Piracy., , , , and . IMIS, page 236-240. IEEE Computer Society, (2014)An effective and intelligent Windows application filtering system using software similarity., , , , , , and . Soft Comput., 20 (5): 1821-1827 (2016)DAAV: Dynamic API Authority Vectors for Detecting Software Theft., , , and . CIKM, page 1819-1822. ACM, (2015)