Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid-Shield: Accurate and Efficient Cross-Layer Countermeasure for Run-Time Detection and Mitigation of Cache-Based Side-Channel Attacks., , , , and . ICCAD, page 36:1-36:9. IEEE, (2020)Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks., , , , , and . ACM Great Lakes Symposium on VLSI, page 181-186. ACM, (2020)Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey., , , and . ISQED, page 1-10. IEEE, (2024)Redefining Trust: Assessing Reliability of Machine Learning Algorithms in Intrusion Detection Systems., , , and . ISCAS, page 1-5. IEEE, (2024)HybriDG: Hybrid Dynamic Time Warping and Gaussian Distribution Model for Detecting Emerging Zero-Day Microarchitectural Side-Channel Attacks., , , , and . ICMLA, page 604-611. IEEE, (2020)A Comprehensive Analysis of Chaos-Based Secure Systems., , , , and . SVCC, volume 1536 of Communications in Computer and Information Science, page 90-105. Springer, (2021)StealthMiner: Specialized Time Series Machine Learning for Run-Time Stealthy Malware Detection based on Microarchitectural Features., , , , , , , and . ACM Great Lakes Symposium on VLSI, page 175-180. ACM, (2020)Image-Based Zero-Day Malware Detection in IoMT Devices: A Hybrid AI-Enabled Method., and . ISQED, page 1-8. IEEE, (2023)Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud., , , , , , and . SEED, page 1-13. IEEE, (2021)Machine Learning to the Rescue: ML-Assisted Framework for Equity-Driven Education., , , , and . EDUCON, page 1254-1263. IEEE, (2022)