Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework.
IEEE Open J. Comput. Soc., 2024
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata.
IEEE Open J. Comput. Soc., 2024
Double-Signed Fragmented DNSSEC for Countering Quantum Threat.
CoRR, 2024
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023
On the Development of a Protection Profile Module for Encryption Key Management Components.
IEEE Access, 2023
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond.
IEEE Access, 2022
Runtime sparse matrix format selection.
Proceedings of the International Conference on Computational Science, 2010
Reinforcement learning for automated performance tuning: Initial evaluation for sparse matrix format selection.
Proceedings of the 2008 IEEE International Conference on Cluster Computing, 29 September, 2008