Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems.. Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Using Network Tainting to Bound the Scope of Network Ingress Attacks., and . SERE, page 206-215. IEEE, (2014)Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests., and . MILCOM, page 980-985. IEEE, (2013)Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments., , , and . CoRR, (2017)Principled Uncertainty Estimation for Deep Neural Networks., and . CoRR, (2018)ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation., , , , and . USENIX Security Symposium, page 303-320. USENIX Association, (2019)Grammatical Inference and Language Frameworks for LANGSEC., and . IEEE Symposium on Security and Privacy Workshops, page 88-98. IEEE Computer Society, (2015)Crafting adversarial input sequences for recurrent neural networks., , , and . MILCOM, page 49-54. IEEE, (2016)When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries., , , , , , and . CoRR, (2015)Identifying Key Cyber-Physical Terrain., and . IWSPA@CODASPY, page 23-28. ACM, (2017)