Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute Based Access Control for Healthcare Resources., , , , , and . ABAC@CODASPY, page 29-40. ACM, (2017)A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm., , and . Comput. J., 64 (8): 1193-1214 (2021)Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails., , and . CCS, page 3603-3605. ACM, (2023)WiP: The Intrinsic Dimensionality of IoT Networks., , and . SACMAT, page 245-250. ACM, (2022)Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection., , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 143-161. Springer, (2022)An Effectiveness Model for Enterprise Architecture Methodologies., , , , and . Int. J. Enterp. Inf. Syst., 11 (2): 50-64 (2015)A New Intrusion Detection System using the Improved Dendritic Cell Algorithm., , and . CoRR, (2020)A Machine-learning based Unbiased Phishing Detection Approach., , and . ICETE (2), page 423-430. ScitePress, (2020)Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements., , , , and . SACMAT, page 91-98. ACM, (2023)Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets., , , , and . WWW (Companion Volume), page 1059-1068. ACM, (2023)