From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Process mining and hierarchical clustering to help intrusion alert visualization., , , , и . Comput. Secur., (2018)Predictably Deterrable? The Case of System Trespassers., , , , и . SpaCCS Workshops, том 11637 из Lecture Notes in Computer Science, стр. 317-330. Springer, (2019)An Approach for Preventing and Detecting Attacks in the Cloud., и . UCC, стр. 165-175. IEEE, (2020)An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System., , и . SRDS, стр. 273-282. IEEE Computer Society, (2003)Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System., , и . PRDC, стр. 9-18. IEEE Computer Society, (2002)Ferret: A Host Vulnerability Checking Tool., , , , и . PRDC, стр. 389-394. IEEE Computer Society, (2004)Building Dependable Distributed Applications Using AQUA., , , , , и . HASE, стр. 189-196. IEEE Computer Society, (1999)Workshop on Empirical Evaluation of Dependability and Security (WEEDS)., и . DSN, стр. 593. IEEE Computer Society, (2006)An Adaptive Algorithm for Tolerating Value Faults and Crash Failures., , и . IEEE Trans. Parallel Distributed Syst., 12 (2): 173-192 (2001)An evaluation of connection characteristics for separating network attacks., и . Int. J. Secur. Networks, 4 (1/2): 110-124 (2009)