From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Follow the Blue Bird: A Study on Threat Data Published on Twitter., , , , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 217-236. Springer, (2020)Third International Workshop on Data-Centric Dependability and Security (DCDS)., , , и . DSN Workshops, стр. xii. IEEE, (2021)Dynamical analysis of diversity in rule-based open source network intrusion detection systems., и . Empir. Softw. Eng., 27 (1): 4 (2022)Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors., , , , , , и . PRDC, стр. 269-278. IEEE, (2018)EDCC 2012 - Fast Abstracts & Student Forum Proceedings, и . CoRR, (2012)Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach., , и . Inf. Softw. Technol., 51 (2): 497-511 (2009)Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities., , и . IEEE Trans. Dependable Secur. Comput., 19 (2): 1181-1193 (2022)Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools., , , , и . EDCC, стр. 57-64. IEEE Computer Society, (2018)FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery., , , , , , , , и . Middleware (Companion), стр. 99-101. ACM, (2008)A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems., , и . Int. J. Inf. Sec., 23 (2): 1331-1346 (апреля 2024)