From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing Alert Data Management Processes at a Cyber Security Operations Center., , , и . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, том 11830 из Lecture Notes in Computer Science, Springer, (2019)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , и . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 307-328. Springer, (1992)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , и . CoRR, (2020)Globally Consistent Event Ordering in One-Directional Distributed Environments., , и . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Understanding the Manipulation on Recommender Systems through Web Injection., , , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Consistency and enforcement of access rules in cooperative data sharing environment., , и . Comput. Secur., (2014)Model-Driven Development for secure information systems., , , и . Inf. Softw. Technol., 51 (5): 809-814 (2009)Intrusion Confinement by Isolation in Information Systems., , и . J. Comput. Secur., 8 (4): 243-279 (2000)A Semantic-Based Transaction Processing Model for Multilevel Transactions., , и . J. Comput. Secur., 6 (3): 181-217 (1998)