Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Cloud Honeypot Architecture., , , and . COMPSAC, page 1176-1181. IEEE, (2021)A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning., , , and . SERVICES, page 177-182. IEEE, (2020)Arguments For Anonymity., , and . HAISA, page 141-150. University of Plymouth, (2015)A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems., , and . ISSE, page 1-6. IEEE, (2019)Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis., , and . SSCI, page 623-630. IEEE, (2018)A new approach for a better recovery of cluster head nodes in underwater sensor networks., , and . TEMU, page 167-172. IEEE, (2014)Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging., , , , , , , and . SSCI, page 1138-1145. IEEE, (2020)BotSpot: Deep Learning Classification of Bot Accounts within Twitter., , , , and . CoRR, (2021)SoMIAP: Social media images analysis and prediction framework., , , and . CoRR, (2021)