Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OSTIS: A novel Organization-Specific Threat Intelligence System., , , , , , and . Comput. Secur., (2024)Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features., , , , , and . CoRR, (2024)Relation Extraction Techniques in Cyber Threat Intelligence., , , , , and . NLDB (1), volume 14762 of Lecture Notes in Computer Science, page 348-363. Springer, (2024)NLP-Based Techniques for Cyber Threat Intelligence., , , , , , and . CoRR, (2023)Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques., , , , , , , , and . IC3, page 305-312. ACM, (2022)SeCTIS: A Framework to Secure CTI Sharing., , , , , , and . CoRR, (2024)SoK: Visualization-based Malware Detection Techniques., , , , and . ARES, page 45:1-45:13. ACM, (2024)Deep learning vs. adversarial noise: a battle in malware image analysis., , , and . Clust. Comput., 27 (7): 9191-9220 (October 2024)XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis., , , , and . J. Netw. Syst. Manag., 32 (4): 88 (October 2024)LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network., , , and . Comput. Networks, (2024)