Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insider Threat on Databases: Modeling and Mitigation Techniques.. University at Buffalo, New York, USA, (2018)base-search.net (ftunivbuffalo:oai:ubir.buffalo.edu:10477/78527).Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems., , , , , and . NOMS, page 1-6. IEEE, (2023)Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain., , and . MIST@CCS, page 81-84. ACM, (2017)A Survey on the Challenges of Implementing Physical Memory Pools., , and . J. Internet Serv. Inf. Secur., 9 (2): 57-71 (2019)Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks., , and . HASP@MICRO, page 53-57. ACM, (2022)Guest Editorial: Special Issue on Advances in Insider Threat Detection., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 1-2 (2021)Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles., , and . SP (Workshops), page 240-243. IEEE, (2020)A Preliminary Cyber Ontology for Insider Threats in the Financial Sector., and . MIST@CCS, page 75-78. ACM, (2015)A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks., and . SIN, page 1-4. IEEE, (2022)Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis., and . AST@ICSE, page 125-128. IEEE, (2021)