From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An attack detection system for secure computer systems - outline of the solution., и . SEC, том 92 из IFIP Conference Proceedings, стр. 123-135. Chapman & Hall, (1997)Attack Modelling in Open Network Environments., , и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 268-277. Chapman & Hall, (1996)Tagged Data Breaches in Online Social Networks., и . e-Democracy, том 570 из Communications in Computer and Information Science, стр. 95-106. Springer, (2015)Multi-technology distributed objects and their integration., , и . Comput. Stand. Interfaces, 23 (3): 157-168 (2001)Trust, privacy and security in digital business., , и . Comput. Syst. Sci. Eng., (2005)Navigation Data Anomaly Analysis and Detection., , , и . Inf., 13 (3): 104 (2022)Understanding situation awareness in SOCs, a systematic literature review., и . Comput. Secur., (марта 2023)A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems., , , , , и . Comput. Secur., (2017)Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture., , , , и . Comput. Secur., 19 (8): 731-746 (2000)SoK: Combating threats in the digital supply chain., и . ARES, стр. 128:1-128:8. ACM, (2022)