Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An attack detection system for secure computer systems - outline of the solution., and . SEC, volume 92 of IFIP Conference Proceedings, page 123-135. Chapman & Hall, (1997)Attack Modelling in Open Network Environments., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 268-277. Chapman & Hall, (1996)Adaptive on-line multiple source detection., , , and . ICASSP (4), page 1029-1032. IEEE, (2005)Tagged Data Breaches in Online Social Networks., and . e-Democracy, volume 570 of Communications in Computer and Information Science, page 95-106. Springer, (2015)Trust, privacy and security in digital business., , and . Comput. Syst. Sci. Eng., (2005)How Much Should We Pay for Security? (Invited Paper)., , , , and . IICIS, volume 193 of IFIP, page 59-69. Springer, (2004)Enforcing Security Policies in Large Scale Communication Networks., , , and . SRDS, page 393-397. IEEE Computer Society, (1998)Methods of Responding to Healthcare Security Incidents., , , , , and . MedInfo, volume 52 of Studies in Health Technology and Informatics, page 1138-1142. IOS Press, (1998)GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control., , , , , , , , , and 4 other author(s). Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 68-78. Springer, (2018)A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory., , , , and . Panhellenic Conference on Informatics, page 222-226. IEEE Computer Society, (2008)