From post

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.

, , и . SSCC, том 1364 из Communications in Computer and Information Science, стр. 1-20. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing., , , , и . IEEE Trans. Dependable Secur. Comput., 16 (4): 565-579 (2019)Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools., , и . SSCC, том 1364 из Communications in Computer and Information Science, стр. 1-20. Springer, (2020)Where is the human in human-centered AI? Insights from developer priorities and user experiences., , , , , , , , , и . Comput. Hum. Behav., (апреля 2023)Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud., , и . TrustCom/BigDataSE/ISPA (1), стр. 563-570. IEEE, (2015)Automating Compliance for Cloud Computing Services., , , и . CLOSER, стр. 631-637. SciTePress, (2012)From Linked Data to Relevant Data -- Time is the Essence, , и . CoRR, (2011)Formal Concept Discovery in Semantic Web Data., , , , , и . ICFCA, том 7278 из Lecture Notes in Computer Science, стр. 164-179. Springer, (2012)Consumer-centric protection for online social networks., , и . IRI, стр. 62-67. IEEE Computer Society, (2014)Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates., , и . Trustcom/BigDataSE/ISPA, стр. 900-908. IEEE, (2016)PrivColl: Practical Privacy-Preserving Collaborative Machine Learning., , , , , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 399-418. Springer, (2020)