Search for persons
X
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
1
Apt Detection of Ransomware - An Approach to Detect Advance..:
, In:
?
Communications in Computer and Information Science; Information Systems Security and Privacy ,
2
A Game Theoretic Approach to the Design of Mitigation Strat..:
, In:
?
Communications in Computer and Information Science; Secure Knowledge Management In Artificial Intelligence Era ,
6
Decepticon: A Hidden Markov Model Approach to Counter Advan..:
, In:
?
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics ,
9
Continuous Authentication Using Behavioral Biometrics:
, In:
?
Proceedings of the 2017 International Workshop on Managing Insider Security Threats ,
10
Complexity of Insider Attacks to Databases:
, In:
?
Proceedings of the 25th International Conference Companion on World Wide Web ,
11
Ettu : Analyzing Query Intents in Corporate Databases:
, In:
?
2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) ,
14
Adaptive techniques for intra-user variability in keystroke..:
, In:
?
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats ,
15