From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed Parties., , , , и . C&ESAR, том 3329 из CEUR Workshop Proceedings, стр. 65-80. CEUR-WS.org, (2022)Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use., , , , , , , , , и . CPS-SPC@CCS, стр. 102-107. ACM, (2018)How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya., , , , , и . NetSoft, стр. 399-404. IEEE, (2024)Recognizing Malicious Intention in an Intrusion Detection Process., , , и . HIS, том 87 из Frontiers in Artificial Intelligence and Applications, стр. 806-817. IOS Press, (2002)Reaction Policy Model Based on Dynamic Organizations and Threat Context., , и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 49-64. Springer, (2009)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , и . ITCC (1), стр. 500-505. IEEE Computer Society, (2005)Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation., , , , , и . ICICS, том 3269 из Lecture Notes in Computer Science, стр. 223-235. Springer, (2004)SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems., , , и . FPS (2), том 14552 из Lecture Notes in Computer Science, стр. 82-92. Springer, (2023)Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services., , , , и . NetSoft, стр. 149-152. IEEE, (2024)Advanced Reaction Using Risk Assessment in Intrusion Detection Systems., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 58-70. Springer, (2007)