Search for persons
X
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
2
Feature Extraction Methods and Classification for Malware I..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
3
Cyber Threat Hunting to Detect Unknown Threats in the Enter..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
4
Unveiling Attack Patterns: A Study of Adversary Behavior fr..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
6
Knowledge Graphs for Cybersecurity: A Framework for Honeypo..:
, In:
?
2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) ,
7
Gap Analysis Between Personal Data Protection Law and Regio..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
8
Analysis of SYN Flood Attack Detection on Web-Based Service..:
, In:
?
2023 11th International Conference on Information and Communication Technology (ICoICT) ,
9
Analyzing Adversary's Attack on Ethereum Collected from Hon..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
11
Investigating Multiple Malware as a Service (MaaS): Analysi..:
, In:
?
2023 International Conference on Informatics, Multimedia, Cyber and Informations System (ICIMCIS) ,
12
Personal Data Protection Framework for Web Developers and A..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
13
Exploration of Malicious Applications on Digital Invitation..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
14
Comparative Analysis of Attack Behavior Patterns in Petya, ..:
, In:
?
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) ,
15