2024
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework.
IEEE Open J. Comput. Soc., 2024

Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata.
IEEE Open J. Comput. Soc., 2024

Double-Signed Fragmented DNSSEC for Countering Quantum Threat.
CoRR, 2024

A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024

2023
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023

On the Development of a Protection Profile Module for Encryption Key Management Components.
IEEE Access, 2023

2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond.
IEEE Access, 2022

2010
Runtime sparse matrix format selection.
Proceedings of the International Conference on Computational Science, 2010

2008
Reinforcement learning for automated performance tuning: Initial evaluation for sparse matrix format selection.
Proceedings of the 2008 IEEE International Conference on Cluster Computing, 29 September, 2008