Author of the publication

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists.

, , , , and . Comput. Electr. Eng., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model-Driven Methodology for Big Data Analytics-as-a-Service., , , , , and . BigData Congress, page 105-112. IEEE Computer Society, (2017)Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists., , , , and . Comput. Electr. Eng., (2021)Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection Engineering., , and . CSR, page 452-457. IEEE, (2024)Trust Me, I'm a Liar.. IEEE Secur. Priv., 20 (6): 79-82 (2022)A Conceptual Graph Model for W3C Resource Description Framework., , and . ICCS, volume 1867 of Lecture Notes in Computer Science, page 468-482. Springer, (2000)Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level., , , , , and . IEEE Trans. Serv. Comput., 14 (2): 516-529 (2021)An Approach to Generate Realistic HTTP Parameters for Application Layer Deception., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 337-355. Springer, (2022)Simulating Deception for Web Applications Using Reinforcement Learning., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 719-737. Springer, (2023)Measuring Developers' Web Security Awareness from Attack and Defense Perspectives., , , , , and . SP (Workshops), page 31-43. IEEE, (2022)An Attack Pattern Framework for Monitoring Enterprise Information Systems., , and . WETICE, page 173-178. IEEE Computer Society, (2016)