From post

Optimal security hardening using multi-objective optimization on attack tree models of networks.

, , , и . ACM Conference on Computer and Communications Security, стр. 204-213. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Poolsappasit, Nayot
add a person with the name Poolsappasit, Nayot
 

Другие публикации лиц с тем же именем

Optimal security hardening on attack tree models of networks: a cost-benefit analysis., , , и . Int. J. Inf. Sec., 11 (3): 167-188 (2012)Towards a scalable model for location privacy., и . SPRINGL, стр. 46-51. ACM, (2008)Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache Resolvers, и . 8th Annual IEEE SMC Information Assurance Workshop (IAW 2007), (июня 2007)Dynamic Security Risk Management Using Bayesian Attack Graphs., , и . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)Towards Achieving Personalized Privacy for Location-Based Services., и . Trans. Data Priv., 2 (1): 77-99 (2009)Trust Management of Encrypted Data Aggregation in a Sensor Network Environment., , и . MDM, стр. 157-166. IEEE Computer Society, (2012)An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems., , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 297-312. Springer, (2008)A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network., и . ICPP, стр. 138-147. IEEE Computer Society, (2011)ETIS - Efficient Trust and Identity Management System for Federated Service Providers., , и . AINA, стр. 219-226. IEEE Computer Society, (2013)Optimal security hardening using multi-objective optimization on attack tree models of networks., , , и . ACM Conference on Computer and Communications Security, стр. 204-213. ACM, (2007)