Author:
Vanamala Mounika,Gilmore Jairen,Yuan Xiaohong,Roy Kaushik
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling;Proceedings of the 2023 12th International Conference on Software and Information Engineering;2023-11-21
2. Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
3. Hybrid Deepfake Detection Utilizing MLP and LSTM;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
4. Different Machine Learning Algorithms used for Secure Software Advance using Software Repositories;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2023-04-05
5. Generating Attack–Defense Tree by Automatically Retrieving Domain-Specific Security Attack Patterns;Artificial Intelligence and Sustainable Computing;2022