From post

On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering.

, , , и . Big Data Cogn. Comput., 7 (1): 1 (марта 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An NLP-Based Framework to Spot Extremist Networks in Social Media., , , , и . Complex., (2024)TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats., , , и . IoTSMS, стр. 123-130. IEEE, (2018)Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering., , , , и . Int. J. Inf. Sec., 23 (6): 3765-3788 (декабря 2024)Managing XACML systems in distributed environments through Meta-Policies., , , и . Comput. Secur., (2015)Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices., , и . J. Inf. Secur. Appl., (2021)On the Power of Social Networks to Analyze Threatening Trends., , , , , , и . IEEE Internet Comput., 26 (2): 19-26 (2022)Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms., , , , , , и . Symmetry, 10 (12): 669 (2018)Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections., , , , , , , и . Inf. Fusion, (2024)On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering., , , и . Big Data Cogn. Comput., 7 (1): 1 (марта 2023)Uncovering Cybercrimes in Social Media through Natural Language Processing., , , , , , и . Complex., (2021)