Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies., , , , , and . USENIX Security Symposium, page 849-864. USENIX Association, (2015)Malicious Code Detection and Acquisition Using Active Learning., , and . ISI, page 371. IEEE, (2007)Host Based Intrusion Detection using Machine Learning., , , , , , , and . ISI, page 107-114. IEEE, (2007)Deployment of DNIDS in Social Networks., , and . ISI, page 59-65. IEEE, (2007)Simulating Threats Propagation within the NSP Infrastructure., , , and . ISI, page 380. IEEE, (2007)AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling., , and . FNSS, volume 670 of Communications in Computer and Information Science, page 1-11. (2016)Google Android: An Updated Security Review., , , and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 401-414. Springer, (2010)Intrusion Detection System for the MIL-STD-1553 Communication Bus., , , and . IEEE Trans. Aerosp. Electron. Syst., 56 (4): 3010-3027 (2020)Friend or foe? Fake profile identification in online social networks., , , and . Soc. Netw. Anal. Min., 4 (1): 194 (2014)Handwritten Signature Verification Using Wrist-Worn Devices., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (3): 119:1-119:26 (2018)