From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones., , , , и . Comput. Secur., (2013)Lateral Movement Detection Using Distributed Data Fusion., , , и . SRDS, стр. 21-30. IEEE Computer Society, (2016)Intrusion detection in enterprise systems by combining and clustering diverse monitor data., , и . HotSoS, стр. 7-16. ACM, (2016)Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment., , и . SafeConfig, стр. 71-74. ACM, (2010)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 81-101. Springer, (2003)Stochastic Methods for Dependability, Performability, and Security Evaluation.. ICATPN, том 3099 из Lecture Notes in Computer Science, стр. 97. Springer, (2004)Smart grid protocol testing through cyber-physical testbeds., , , и . ISGT, стр. 1-6. IEEE, (2013)TCIPG: Trustworthy cyber infrastructure for the power grid overview.. ISGT, стр. 1-2. IEEE, (2012)Revisiting Client Puzzles for State Exhaustion Attacks Resilience., , , , , , и . DSN, стр. 617-629. IEEE, (2019)Modeling and analysis of worm defense using stochastic activity networks., , , и . SpringSim (3), стр. 349-355. SCS/ACM, (2007)