From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a standardised attack graph visual syntax.. University of Warwick, Coventry, UK, (2019)British Library, EThOS.CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection., , и . TrustCom, стр. 931-936. IEEE Computer Society, (2012)Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic., , , , , , и . Comput. Secur., (2021)Measuring User Perceived Security of Mobile Banking Applications., и . CoRR, (2022)Secure search scheme for encrypted data in the VANET cloud with random query trapdoor., , и . Inf. Secur. J. A Glob. Perspect., 32 (5): 383-400 (сентября 2023)Digital Forensics to Intelligent Forensics., и . Future Internet, 6 (3): 584-596 (2014)Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector., , , и . Comput., 14 (2): 49 (2025)Impact of imbalanced datasets on ML algorithms for malware classification., , и . Inf. Secur. J. A Glob. Perspect., 34 (3): 251-264 (мая 2025)Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage Systems., и . Cyberpatterns, Springer, (2014)A review of attack graph and attack tree visual syntax in cyber security., , и . Comput. Sci. Rev., (2020)