From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Government-Based Security Standards., , и . Information Systems Security, 6 (3): 9-19 (1997)Academia Leadership in Improving the Cybersecurity Posture of Government and Local Communities., , , и . HICSS, стр. 1911-1920. ScholarSpace, (2024)The Role of Exercises in Training the Nation's Cyber First-Responders., и . AMCIS, стр. 560. Association for Information Systems, (2004)Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events., , и . HICSS, IEEE Computer Society, (2004)Analysis of Payload Based Application level Network Anomaly Detection., и . HICSS, стр. 99. IEEE Computer Society, (2007)e-Government and Cyber Security: The Role of Cyber Security Exercises., и . HICSS, IEEE Computer Society, (2006)Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack., , и . HICSS, стр. 2252. IEEE Computer Society, (2015)The Honey Community: Use of Combined Organizational Data for Community Protection., , и . HICSS, стр. 2288-2297. IEEE Computer Society, (2015)Introduction to Infrastructure Security Minitrack., , и . HICSS, стр. 1986. IEEE Computer Society, (2014)An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection., и . IPDPS, стр. 1-8. IEEE, (2007)