From post

AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels.

, , , , и . EISA, том 1641 из Communications in Computer and Information Science, стр. 126-144. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control Model for Grid Virtual Organizations., , , , и . ICEIS (3), стр. 152-158. (2005)dynSMAUG: A dynamic security management framework driven by situations., , , и . CSNet, стр. 1-8. IEEE, (2017)Logic-based methodology to help security architects in eliciting high-level network security requirements., , , , и . SAC, стр. 1610-1619. ACM, (2019)A trust-based virtual collaborative environment., , , и . J. Digit. Inf. Manag., 6 (5): 405-413 (2008)Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker., , , , , , и . Secur. Commun. Networks, (2017)Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies., , , , и . SAC, стр. 1316-1318. ACM, (2018)Dealing with Stable Environmental Conditions in XACML Systems., и . ICSNC, стр. 63. IEEE Computer Society, (2007)An Adaptive XACMLv3 Policy Enforcement Point., , , и . COMPSAC Workshops, стр. 620-625. IEEE Computer Society, (2014)A Model for Assessing the Adherence of E-Identity Solutions to Self-Sovereign Identity., , , , , , и . WorldCIST (1), том 985 из Lecture Notes in Networks and Systems, стр. 153-163. Springer, (2024)Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates., , , , , и . SEC, том 679 из IFIP Advances in Information and Communication Technology, стр. 265-278. Springer, (2023)