From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models., , , , , , и . CSR, стр. 348-353. IEEE, (2021)Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes., , , , , , , и . HCI (20), том 9750 из Lecture Notes in Computer Science, стр. 221-233. Springer, (2016)Towards a framework for detecting advanced Web bots., , , , , и . ARES, стр. 18:1-18:10. ACM, (2019)Adaptive Focused Crawling Using Online Learning - A Study on Content Related to Islamic Extremism., , , , и . INSCI, том 11193 из Lecture Notes in Computer Science, стр. 40-53. Springer, (2018)Web Bot Detection Evasion Using Generative Adversarial Networks., , , , , и . CSR, стр. 115-120. IEEE, (2021)Towards Selecting Informative Content for Cyber Threat Intelligence., , , , , , и . CSR, стр. 354-359. IEEE, (2021)Web Bot Detection Evasion Using Deep Reinforcement Learning., , , , , и . ARES, стр. 15:1-15:10. ACM, (2022)Cyber Security Certification Programmes., , , , , , , , , и 9 other автор(ы). CSR, стр. 428-435. IEEE, (2021)Host-based Cyber Attack Pattern Identification on Honeypot Logs Using Association Rule Learning., , , , , и . CSR, стр. 50-55. IEEE, (2022)Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot Dataset., , , , , , , , и . CSR, стр. 267-272. IEEE, (2022)