Using Burstiness for Network Applications Classification | 0 | 0.34 | 2019 |
User Profiling Based on Application-Level Using Network Metadata | 0 | 0.34 | 2019 |
Physical Activity Recognition By Utilising Smartphone Sensor Signals | 0 | 0.34 | 2019 |
Biometrically Linking Document Leakage to the Individuals Responsible. | 0 | 0.34 | 2018 |
Securing Cloud Storage by Transparent Biometric Cryptography. | 0 | 0.34 | 2018 |
Insider Misuse Attribution using Biometrics | 2 | 0.37 | 2017 |
Leveraging Biometrics for Insider Misuse Identification. | 0 | 0.34 | 2016 |
Proactive biometric-enabled forensic imprinting | 1 | 0.35 | 2016 |
Two Novel 802.1x Denial of Service Attacks | 0 | 0.34 | 2011 |