Author of the publication

A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection Systems.

, , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-4. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance-based Intrusion Detection Systems: A Survey., , , and . ACM Comput. Surv., 55 (7): 135:1-135:36 (2023)Context-Aware Transfer of Task-Based IoT Service Settings., , and . IntelliSys (3), volume 1252 of Advances in Intelligent Systems and Computing, page 96-114. Springer, (2020)A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection Systems., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-4. IEEE, (2022)Speech Triggered Mobility Support and Privacy., , and . Intelligent Information Processing, volume 581 of IFIP Advances in Information and Communication Technology, page 273-283. Springer, (2020)S-index: Significance of Academic Authors to Individual Publication Venues., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)