关注
Leslie F. Sikos
标题
引用次数
引用次数
年份
AI in Cybersecurity
LF Sikos
Springer, 2018
186*2018
Packet Analysis for Network Forensics: A Comprehensive Survey
LF Sikos
Forensic Science International: Digital Investigation 32 (C), 200892, 2020
1362020
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data
LF Sikos
Apress, 2015
118*2015
Reliability, Availability and Maintenance Optimisation of Heat Exchanger Networks
L Sikos, J Klemeš
Applied Thermal Engineering 30 (1), 63–69, 2010
982010
Description Logics in Multimedia Reasoning
LF Sikos
Springer, 2017
87*2017
Data Science in Cybersecurity and Cyberthreat Intelligence
LF Sikos, KKR Choo
Springer, 2020
85*2020
Web Standards: Mastering HTML5, CSS3, and XML
LF Sikos
Apress, 2011
70*2011
Toward a Sustainable Cybersecurity Ecosystem
S Sadik, M Ahmed, LF Sikos, AKMN Islam
Computers 9 (3), 74, 2020
672020
Provenance-Aware Knowledge Representation: A Survey of Data Models and Contextualized Knowledge Graphs
LF Sikos, D Philp
Data Science and Engineering 5 (3), 293–316, 2020
642020
ECU-IoHT: A Dataset for Analyzing Cyberattacks in Internet of Health Things
M Ahmed, S Byreddy, A Nutakki, LF Sikos, P Haskell-Dowland
Ad Hoc Networks 122, 2021
442021
AI in Digital Forensics: Ontology Engineering for Cybercrime Investigations
LF Sikos
WIREs Forensic Science, 2020
442020
Review and Analysis of Cowrie Artefacts and Their Potential to Be Used Deceptively
W Cabral, C Valli, LF Sikos, SG Wakeling
2019 International Conference on Computational Science and Computational …, 2019
432019
RDF-Powered Semantic Video Annotation Tools with Concept Mapping to Linked Data for Next-Generation Video Indexing: A Comprehensive Review
LF Sikos
Multimedia Tools and Applications 76 (12), 14437–14460, 2016
342016
DoS/DDoS-MQTT-IoT: A Dataset for Evaluating Intrusions Into IoT Networks Using the MQTT Protocol
A Alatram, LF Sikos, M Johnstone, P Szewczyk, JJ Kang
Computer Networks 231, 109809, 2023
312023
Cybersecurity Knowledge Graphs
LF Sikos
Knowledge and Information Systems 65, 3511–3531, 2023
302023
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-Evolution-Based Feature Selection
B Rashid, M Ahmed, LF Sikos, P Haskell-Dowland
ACM Transactions on Management Information Systems 13 (3), Article 29, 2022
302022
Evaluation and Assessment of Reliability and Availability Software for Securing an Uninterrupted Energy Supply
L Sikos, J Klemeš
Clean Technologies and Environmental Policy 12 (2), 137–146, 2010
292010
Security and Forensics in the Internet of Things: Research Advances and Challenges
W Yang, MN Johnstone, LF Sikos, S Wang
Workshop on Emerging Technologies for Security in IoT, 2020
272020
VidOnt: a Core Reference Ontology for Reasoning over Video Scenes
LF Sikos
Journal of Information and Telecommunication 2 (2), 2018
272018
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge
LF Sikos
AI in Cybersecurity, 1-17, 2019
252019
系统目前无法执行此操作,请稍后再试。
文章 1–20