1. AI-Driven IT and Its Potentials – A State-of-the-Art Approach;SSRN Electronic Journal;2020
2. Towards models for quantifying the known adversary;Proceedings of the New Security Paradigms Workshop;2019-09-23
3. Everything-as-a-hack;Proceedings of the New Security Paradigms Workshop;2019-09-23
4. Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics;Lecture Notes in Networks and Systems;2019-02-02
5. Application of Verification Techniques to Security;Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability;2014