Search for persons
X
?
Communications in Computer and Information Science; Ubiquitous Security ,
1
Honey-Gauge: Enabling User-Centric Honeypot Classification:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
2
Do NoT Open (DOT): A Unified Generic and Specialized Models..:
, In:
?
2023 20th Annual International Conference on Privacy, Security and Trust (PST) ,
3
ThreatLand: Extracting Intelligence from Audit Logs via NLP..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
4
Hiatus: Unsupervised Generative Approach for Detection of D..:
, In:
?
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
5
FOCUS: Fatigue-Reducing IOCs Through Prioritization and Sco..:
, In:
?
2023 IEEE Conference on Dependable and Secure Computing (DSC) ,
6
APTer: Towards the Investigation of APT Attribution:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
8
Peekaboo: Hide and Seek with Malware Through Lightweight Mu..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
9
ODDITY: An Ensemble Framework Leverages Contrastive Represe..:
, In:
?
2022 19th Annual International Conference on Privacy, Security & Trust (PST) ,
10
LOG-OFF: A Novel Behavior Based Authentication Compromise D..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
13
OVER : overhauling vulnerability detection for iot throu..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
14
SMuF: State Machine Based Mutational Fuzzing Framework for ..:
, In:
?
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security ,
15