From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement., , и . GraMSec@FLoC, том 11086 из Lecture Notes in Computer Science, стр. 90-110. Springer, (2018)Robust active attacks on social graphs., , и . CoRR, (2018)Foundations of Attack Trees., и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 186-198. Springer, (2005)An Algebra for Trust Dilution and Trust Fusion., и . Formal Aspects in Security and Trust, том 5983 из Lecture Notes in Computer Science, стр. 4-20. Springer, (2009)Checking Secrecy by Means of Partial Order Reduction., и . SAM, том 3319 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2004)Towards a Decision Model Based on Trust and Security Risk Management., , , , и . AISC, том 98 из CRPIT, стр. 61-69. Australian Computer Society, (2009)Probabilities In The Torx Test Derivation Algorithm., , и . SAM, стр. 173-188. VERIMAG, IRISA, SDL Forum, (2000)Comparing distance bounding protocols: A critical mission supported by decision theory., , и . Comput. Commun., (2015)mCarve: Carving Attributed Dump Sets., , и . USENIX Security Symposium, USENIX Association, (2011)Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation., , и . Knowl. Inf. Syst., 64 (4): 1077-1100 (2022)