1. A. Albasir , R. S. R. James , K. Naik , and A. Nayak . 2018. Using Deep Learning to Classify Power Consumption Signals of Wireless Devices: An Application to Cybersecurity . In 2018 IEEE Int. Conference on Acoustics, Speech and Signal Processing (ICASSP). A. Albasir, R. S. R. James, K. Naik, and A. Nayak. 2018. Using Deep Learning to Classify Power Consumption Signals of Wireless Devices: An Application to Cybersecurity. In 2018 IEEE Int. Conference on Acoustics, Speech and Signal Processing (ICASSP).
2. A. Alnasser H. Sun and J. Jiang. 2019. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks (2019). A. Alnasser H. Sun and J. Jiang. 2019. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks (2019).
3. A. Antonini , F. Maggi , and S. Zanero . 2014. A Practical Attack Against a KNX-based Building Automation System .. In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014 ). A. Antonini, F. Maggi, and S. Zanero. 2014. A Practical Attack Against a KNX-based Building Automation System.. In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014).
4. Using Behavioral Profiles to Detect Software Flaws in Network Servers
5. D. Arp , M. Spreitzenbarth , M. Hubner , H. Gascon , K. Rieck , and C. Siemens . 2014 . DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In Ndss, Vol. 14. D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, and C. Siemens. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In Ndss, Vol. 14.