Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Cyber Defenses for Botnet Detection and Mitigation., , , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Classifying Human-Generated and AI-Generated Election Claims in Social Media., , , , and . CoRR, (2024)Vulnerability Metrics for Graph-based Configuration Security., , , , and . SECRYPT, page 259-270. SCITEPRESS, (2021)FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers., and . CVIP (1), volume 1376 of Communications in Computer and Information Science, page 500-511. Springer, (2020)Towards Usable Scoring of Common Weaknesses., and . SECRYPT, page 183-191. SCITEPRESS, (2023)A Formal Model for Credential Hopping Attacks., , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 367-386. Springer, (2022)2014 Index IEEE Transactions on Knowledge and Data Engineering Vol. 26, , , , , , , , , and . IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 27 (1): 289 (2015)SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , and . CNS, page 1-10. IEEE, (2020)A framework for designing vulnerability metrics., , and . Comput. Secur., (September 2023)Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses., , , , and . SECRYPT, page 215-225. SCITEPRESS, (2022)