From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models., , и . ISC, том 3650 из Lecture Notes in Computer Science, стр. 506-514. Springer, (2005)Integration of computer security into the software engineering and computer science programs., и . J. Syst. Softw., 49 (2-3): 149-153 (1999)A Report on Industrial Transfer of Software Engineering to the Classroom Environment.. CSEE&T, стр. 15-22. IEEE Computer Society, (2000)A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems., , и . HICSS, стр. 2338-2345. IEEE Computer Society, (2012)Deterministic Intrusion Detection Rules for MODBUS Protocols., , , и . HICSS, стр. 1773-1781. IEEE Computer Society, (2013)A Discovery Learning Approach to Information Assurance Education., и . HICSS, стр. 1-9. IEEE Computer Society, (2009)Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment., и . CAINE, стр. 278-283. ISCA, (2007)Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security., , и . AISC, том 138 из CRPIT, стр. 67-76. Australian Computer Society, (2013)Information system security compliance to FISMA standard: A quantitative measure., и . IMCSIT, стр. 799-806. IEEE, (2008)Efficient Update on Exploitation Graphs for Vulnerability Analysis., и . CAINE, стр. 295-300. ISCA, (2007)