Amir Azodi

According to our database1, Amir Azodi authored at least 13 papers between 2012 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Event Driven Network Topology Discovery and Inventory Listing Using REAMS.
Wirel. Pers. Commun., 2017

2016
Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Normalizing Security Events with a Hierarchical Knowledge Base.
Proceedings of the Information Security Theory and Practice, 2015

Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

2014
A Modular Framework for Multi-Factor Authentication and Key Exchange.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Security Event Correlation Supported by Multi-Core Architecture.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

How to Attack Two-Factor Authentication Internet Banking.
Proceedings of the Financial Cryptography and Data Security, 2013

A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Multi-core Supported High Performance Security Analytics.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2012


  Loading...