Author of the publication

Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra.

, , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 67-87. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation of fingerprint images - A composite method., and . Pattern Recognition, 22 (4): 381-385 (1989)Shape Measures for Content Based Image Retrieval: A Comparison., , and . Inf. Process. Manage., 33 (3): 319-337 (1997)Digital video tampering detection: An overview of passive techniques., and . Digital Investigation, (2016)Automated camera sabotage detection for enhancing video surveillance systems., and . Multimedia Tools Appl., 78 (5): 5819-5841 (2019)Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra., , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 67-87. Springer, (2018)An overview of vulnerability assessment and penetration testing techniques., and . J. Computer Virology and Hacking Techniques, 11 (1): 27-49 (2015)Content-Based Image Retrieval Using a Composite Color-Shape Approach., , and . Inf. Process. Manage., 34 (1): 109-120 (1998)Real-Time Automatic Camera Sabotage Detection for Surveillance Systems., and . SIRS, volume 425 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2015)STAR - A Multimedia Database System For Trademark Registration., , , , and . ADB, volume 819 of Lecture Notes in Computer Science, page 109-122. Springer, (1994)Network intrusion detection system using J48 Decision Tree., and . ICACCI, page 2023-2026. IEEE, (2015)