Personensuche
X
?
Proceedings of the Great Lakes Symposium on VLSI 2024 ,
1
Comprehensive Analysis of Consistency and Robustness of Mac..:
, In:
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
2
Defending Multi-Cloud Applications Against Man-in-the-Middl..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
5
SoK: Modeling Explainability in Security Analytics for Inte..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
6
Looking Beyond IoCs: Automatically Extracting Attack Patter..:
, In:
?
Companion Proceedings of the ACM Web Conference 2023 ,
7
Graph-based Approach for Studying Spread of Radical Online ..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
8
TINKER: A framework for Open source Cyberthreat Intelligenc:
, In:
?
Cognitive Informatics in Biomedicine and Healthcare; Personal Health Informatics ,
9
Semantic Technologies for Clinically Relevant Personal Heal..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
10
An Ontology-driven Knowledge Graph for Android Malware:
, In:
?
Deployable Machine Learning for Security Defense; Communications in Computer and Information Science ,
11
MALOnt: An Ontology for Malware Threat Intelligence:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12