Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Cyberdefense for Survival and Intrusion Tolerance., , , , , and . IEEE Internet Comput., 8 (6): 25-33 (2004)An architecture for adaptive intrusion-tolerant applications., , , , , , , , , and 3 other author(s). Softw. Pract. Exp., 36 (11-12): 1331-1354 (2006)Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing., , , and . NCA, page 285-292. IEEE Computer Society, (2006)Using a Cognitive Architecture to Automate Cyberdefense Reasoning., , , , and . BLISS, page 58-63. IEEE Computer Society, (2008)Survivability Architecture of a Mission Critical System: The DPASA Example., , , , and . ACSAC, page 495-504. IEEE Computer Society, (2005)Survival by defense-enabling., , and . NSPW, page 71-78. ACM, (2001)Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 408-409. Springer, (2008)Protecting Applications Against Malice Using AdaptiveMiddleware., , , , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 73-108. Kluwer, (2002)An abstract interface for cyber-defense mechanisms., , , and . CSIIRW, page 37:1-37:3. ACM, (2008)Building Adaptive and Agile Applications Using Intrusion Detection and Response., , , and . NDSS, The Internet Society, (2000)