Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boundary Detection and Containment of Local Worm Infections., , and . SRUTI, USENIX Association, (2007)Vision-Based Localization System Suited to Resident Underwater Vehicles., , , , , and . Sensors, 20 (2): 529 (2020)Towards automated cyber decision support: A case study on network segmentation for security., , , , , , and . SSCI, page 1-10. IEEE, (2016)Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 405-425. Springer, (2014)Capturing the security effects of network segmentation via a continuous-time markov chain model., , , , and . SpringSim (ANSS), page 17:1-17:12. Society for Computer Simulation International / ACM, (2017)Deriving Expertise Profiles from Tags., , and . CSE (4), page 34-41. IEEE Computer Society, (2009)Performance Analysis of Compiler Support for Parallel Evaluation of C++ Constant Expressions., , , and . KKIO@FedCSIS, volume 499 of Lecture Notes in Business Information Processing, page 129-152. Springer, (2023)Environmental Key Generation Towards Clueless Agents., and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 15-24. Springer, (1998)EMBER: a global perspective on extreme malicious behavior., , , and . VizSEC, page 1-12. ACM, (2010)A Certified E-Mail Protocol., and . ACSAC, page 347-352. IEEE Computer Society, (1998)