Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach., , , , , and . CoRR, (2018)Increasing Trust in Tor Node List Using Blockchain., , , and . IEEE ICBC, page 29-32. IEEE, (2019)Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures., , , , and . ACM Comput. Surv., 52 (2): 30:1-30:40 (2019)HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices., , , , and . AsiaCCS, page 479-484. ACM, (2019)HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)., , , , and . CoRR, (2019)An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets., , , and . CoRR, (2018)Detection of Masqueraders Based on Graph Partitioning of File System Access Events., , , , and . IEEE Symposium on Security and Privacy Workshops, page 217-227. IEEE Computer Society, (2018)StrongChain: Transparent and Collaborative Proof-of-Work Consensus., , , and . USENIX Security Symposium, page 819-836. USENIX Association, (2019)The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition., , , , , , and . JoWUA, 9 (1): 54-85 (2018)Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks., , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 66-78. (2016)