From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Modal Logic Framework to Solve Aggregation Problems.. DBSec, том A-6 из IFIP Transactions, стр. 315-332. North-Holland, (1991)Un langage de requêtes pour obtenir des résponses intelligentes.. BDA, стр. 249-. INRIA, (1989)Managing the Overestimation of Resilience., , и . ARES, стр. 35:1-35:10. ACM, (2019)An ontology-based approach to react to network attacks., , , и . Int. J. Inf. Comput. Secur., 3 (3/4): 280-305 (2009)Cover Story Management., и . CoRR, (2014)A Flexible and Distributed Architecture to Enforce Dynamic Access Control., , и . SEC, том 201 из IFIP, стр. 183-195. Springer, (2006)Software Defined Networking Reactive Stateful Firewall., , , и . SEC, том 471 из IFIP Advances in Information and Communication Technology, стр. 119-132. Springer, (2016)An Extended Role-Based Access Control Model for Delegating Obligations., , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 127-137. Springer, (2009)wIDS: A Multilayer IDS for Wireless-Based SCADA Systems., , , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 387-404. Springer, (2017)Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking., , , , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 153-162. Springer, (2009)