Author of the publication

Optimal security hardening using multi-objective optimization on attack tree models of networks.

, , , and . ACM Conference on Computer and Communications Security, page 204-213. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dewri, Rinku
add a person with the name Dewri, Rinku
 

Other publications of authors with the same name

A case study of black box fail-safe testing in web applications., , , and . J. Syst. Softw., (2017)Dynamic Security Risk Management Using Bayesian Attack Graphs., , and . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)A Characterization of the Mass Surveillance Potential of Road Traffic Monitors., , , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 3-23. Springer, (2018)Towards achieving efficient access control of medical data with both forward and backward secrecy., , , and . Comput. Commun., (2022)Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system., , , , , , , , , and 6 other author(s). J. Parallel Distributed Comput., (2016)POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice., , , and . CIKM, page 1037-1046. ACM, (2009)Leveraging Smartphone Advances for Continuous Location Privacy., , , and . MDM (1), page 197-202. IEEE Computer Society, (2015)Towards Optimal Multi-level Tiling for Stencil Computations., , , and . IPDPS, page 1-10. IEEE, (2007)On the Identification of Property Based Generalizations in Microdata Anonymization., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 81-96. Springer, (2010)An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems., , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 297-312. Springer, (2008)