Mark Stamp
Orcid: 0000-0002-3803-8368Affiliations:
- San Jose State University, Department of Computer Science, CA, USA
According to our database1,
Mark Stamp
authored at least 119 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., November, 2024
J. Comput. Virol. Hacking Tech., November, 2024
J. Comput. Virol. Hacking Tech., November, 2024
J. Comput. Virol. Hacking Tech., November, 2024
J. Comput. Virol. Hacking Tech., 2024
J. Comput. Virol. Hacking Tech., 2024
2023
J. Comput. Virol. Hacking Tech., November, 2023
Inf. Sci., August, 2023
Comput. Secur., April, 2023
J. Comput. Virol. Hacking Tech., March, 2023
CoRR, 2023
2022
CoRR, 2022
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022
2021
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication.
CoRR, 2021
CoRR, 2021
CoRR, 2021
Comput. Biol. Medicine, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Convolutional neural networks and extreme learning machines for malware classification.
J. Comput. Virol. Hacking Tech., 2020
Inf. Secur. J. A Glob. Perspect., 2020
2019
J. Comput. Virol. Hacking Tech., 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
A Survey of Machine Learning Algorithms and Their Application in Information Security.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 1st International Conference on Historical Cryptology, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
2015
J. Comput. Virol. Hacking Tech., 2015
J. Comput. Virol. Hacking Tech., 2015
J. Comput. Virol. Hacking Tech., 2015
2014
J. Comput. Virol. Hacking Tech., 2014
J. Comput. Virol. Hacking Tech., 2014
Inf. Secur. J. A Glob. Perspect., 2014
2013
J. Comput. Virol. Hacking Tech., 2013
J. Comput. Virol. Hacking Tech., 2013
J. Comput. Virol. Hacking Tech., 2013
Inf. Secur. J. A Glob. Perspect., 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
2009
J. Comput. Virol., 2009
2008
QuickPay Online Payment Protocol.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
2007
Inf. Manag. Comput. Secur., 2007
2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Role Based Access Control and the JXTA Peer-to-Peer Framework.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
Commun. Inf. Syst., 2005
Stealthy Ciphertext.
Proceedings of The 2005 International Conference on Internet Computing, 2005
Information security - principles and practice.
Wiley, ISBN: 978-0-471-73848-0, 2005
2004
2003
J. Electron. Commer. Res., 2003
2002
1993
IEEE Trans. Inf. Theory, 1993
1992