From post

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.

, , и . AAAI, стр. 808-813. AAAI Press / The MIT Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)., , , , и . GECON, том 11113 из Lecture Notes in Computer Science, стр. 243-251. Springer, (2018)Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints., , и . AAAI, стр. 808-813. AAAI Press / The MIT Press, (2004)On merging two trust-networks in one with bipolar preferences., и . Math. Struct. Comput. Sci., 27 (2): 215-233 (2017)Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria., , , и . Secur. Commun. Networks, 3 (6): 595-610 (2010)Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017., , и . Fundam. Informaticae, 166 (2): 139-140 (2019)A Comparative Test on the Enumeration of Extensions in Abstract Argumentation., , и . Fundam. Informaticae, 140 (3-4): 263-278 (2015)Editorial., и . J. Heuristics, 12 (4-5): 239-240 (2006)Semiring-based contstraint logic programming: syntax and semantics., , и . ACM Trans. Program. Lang. Syst., 23 (1): 1-29 (2001)Architecting the Web of Things for the fog computing era., , , и . IET Softw., 12 (5): 381-389 (2018)Reasoning about Secure Interoperation Using Soft Constraints., , и . Formal Aspects in Security and Trust, том 173 из IFIP, стр. 173-186. Springer, (2004)