Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Explainable Intrusion Detection System: Global vs. Local Approach., , , , and . ARTMAN@CCS, page 37-42. ACM, (2023)Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis., and . TrustCom, page 1771-1776. IEEE, (2020)IoT Malware Detection Using Function-Call-Graph Embedding., , , , and . PST, page 1-9. IEEE, (2021)Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow., , and . IIH-MSP, page 644-647. IEEE Computer Society, (2009)Identity Based Authenticated Key Agreement for Tree-Based Group., , and . IIH-MSP, page 941-944. IEEE Computer Society, (2009)Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort., , , and . CODASPY, page 329-331. ACM, (2021)An autonomous online malicious spam email detection system using extended RBF network., , , , and . IJCNN, page 1-7. IEEE, (2015)Application of string kernel based support vector machine for malware packer identification., , , , and . IJCNN, page 1-8. IEEE, (2013)An Accurate Packer Identification Method Using Support Vector Machine., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 253-263 (2014)Discovery of Relationships between Interests from Bulletin Board System by Dissimilarity Reconstruction., , and . Discovery Science, volume 2843 of Lecture Notes in Computer Science, page 328-335. Springer, (2003)