From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level., , , , , и . USENIX Security Symposium, стр. 621-637. USENIX Association, (2018)Securing an InfiniBand Network and its Effect on Performance., , , , и . Critical Infrastructure Protection, том 596 из IFIP Advances in Information and Communication Technology, стр. 157-179. Springer, (2020)Anomaly Detection in Automation Controllers., , , и . Critical Infrastructure Protection, том 636 из IFIP Advances in Information and Communication Technology, стр. 97-118. Springer, (2021)InfiniBand Network Monitoring: Challenges and Possibilities., , , и . Critical Infrastructure Protection, том 636 из IFIP Advances in Information and Communication Technology, стр. 187-208. Springer, (2021)Expanding Communities of Practice: The Digital Humanities Research Institute Model., , , , , , , , , и . DH, стр. 659. Red de Humanidades Digitales A. C., (2018)Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles., , , и . Critical Infrastructure Protection, том 596 из IFIP Advances in Information and Communication Technology, стр. 25-44. Springer, (2020)Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems., , , и . Critical Infrastructure Protection, том 596 из IFIP Advances in Information and Communication Technology, стр. 111-133. Springer, (2020)Vulnerability Assessment of InfiniBand Networking., , , и . Critical Infrastructure Protection, том 570 из IFIP Advances in Information and Communication Technology, стр. 179-205. Springer, (2019)Quantifying Covertness in Deceptive Cyber Operations., , и . Cyber Deception, Springer, (2016)