From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cost modeling of response actions for automated response and recovery in AMI., , и . SmartGridComm, стр. 348-353. IEEE, (2012)A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures., , , , и . IEEE J. Sel. Areas Commun., 31 (7): 1319-1330 (2013)Lateral Movement Detection Using Distributed Data Fusion., , , и . SRDS, стр. 21-30. IEEE Computer Society, (2016)Revisiting Client Puzzles for State Exhaustion Attacks Resilience., , , , , , и . DSN, стр. 617-629. IEEE, (2019)An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement., , , и . SRDS, стр. 224-233. IEEE Computer Society, (2017)A Game-Theoretic Approach to Respond to Attacker Lateral Movement., , , и . GameSec, том 9996 из Lecture Notes in Computer Science, стр. 294-313. Springer, (2016)PowerAlert: An Integrity Checker using Power Measurement., , и . CoRR, (2017)Achieving cyber resiliency against lateral movement through detection and response. University of Illinois Urbana-Champaign, USA, (2017)Modeling Humans: A General Agent Model for the Evaluation of Security., , , и . QEST, том 11024 из Lecture Notes in Computer Science, стр. 373-388. Springer, (2018)Detecting monitor compromise using evidential reasoning: poster., , и . HotSoS, стр. 16:1. ACM, (2018)