Search for persons
X
?
Proceedings of the 19th ACM symposium on Access control models and technologies ,
2
Monitor placement for large-scale systems:
, In:
?
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research ,
3
Web traffic profiling and characterization:
, In:
?
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research ,
4
A novel data reduction technique:
, In:
?
2023 International Conference on Machine Learning and Applications (ICMLA) ,
5
Flood-ResNet50: Optimized Deep Learning Model for Efficient..:
, In:
?
2023 IEEE International Conference on Smart Computing (SMARTCOMP) ,
6
Vision Transformer-based Real-Time Camouflaged Object Detec..:
, In:
?
2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) ,
8
Secure Federated Training: Detecting Compromised Nodes and ..:
, In:
?
Proceedings of the 2016 ACM Workshop on Moving Target Defense ,
9
Demo : A Symbolic N-Variant System:
, In:
?
Proceedings of the First ACM Workshop on Moving Target Defense ,
10
Comparing Different Moving Target Defense Techniques:
, In:
?
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop ,
11
Visualizing graph features for fast port scan detection:
, In:
?
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop ,
12
Vulnerability analysis of a smart grid with monitoring and ..:
, In:
?
Proceedings of the Ninth International Symposium on Visualization for Cyber Security ,
13