From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers., , , , , , , , , и 1 other автор(ы). HotSoS, стр. 13-23. ACM, (2017)Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks., и . SafeConfig@CCS, стр. 23-29. ACM, (2016)ConfigChecker: A tool for comprehensive security configuration analytics., и . SafeConfig, IEEE, (2011)Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques., , и . ICETE (2), стр. 412-423. SciTePress, (2018)Optimizing the RoI of cyber risk mitigation., , und . CNSM, Seite 223-227. IEEE, (2016)Security configuration analytics using video games., und . CNS, Seite 256-264. IEEE, (2014)Objective metrics for firewall security: A holistic view., , und . CNS, Seite 470-477. IEEE, (2013)Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems., und . SafeConfig, Seite 25-28. ACM, (2014)SCAP Based Configuration Analytics for Comprehensive Compliance Checking., und . SafeConfig, IEEE, (2011)Towards a Unified Modeling and Verification of Network and System Security Configurations., , und . SafeConfig, Seite 3-19. Springer, (2012)