From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Frameworks for evaluating discrete event dynamic systems., и . Discrete Event Dynamic Systems, 3 (2-3): 113-118 (1993)Lateral Movement Detection Using Distributed Data Fusion., , , и . SRDS, стр. 21-30. IEEE Computer Society, (2016)Intrusion detection in enterprise systems by combining and clustering diverse monitor data., , и . HotSoS, стр. 7-16. ACM, (2016)Revisiting Client Puzzles for State Exhaustion Attacks Resilience., , , , , , и . DSN, стр. 617-629. IEEE, (2019)A modular method for evaluating the performance of picture archiving and communication systems., , и . J. Digital Imaging, 6 (3): 172-193 (1993)Smart grid protocol testing through cyber-physical testbeds., , , и . ISGT, стр. 1-6. IEEE, (2013)TCIPG: Trustworthy cyber infrastructure for the power grid overview.. ISGT, стр. 1-2. IEEE, (2012)Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment., , и . SafeConfig, стр. 71-74. ACM, (2010)Stochastic Methods for Dependability, Performability, and Security Evaluation.. ICATPN, том 3099 из Lecture Notes in Computer Science, стр. 97. Springer, (2004)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 81-101. Springer, (2003)