From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence., и . DFRWS, (2005)The Internet Worm: Crisis and Aftermath. Communications of the ACM, 32 (6): 678--687 (июня 1989)Dynamic Slicing in the Presence of Unconstrained Pointers., , и . Symposium on Testing, Analysis, and Verification, стр. 60-73. ACM, (1991)Support for Implementing Scheduling Algorithms Using MESSIAHS., и . Sci. Program., 3 (4): 325-340 (1994)A Hypergame Analysis for ErsatzPasswords., , , и . SEC, том 529 из IFIP Advances in Information and Communication Technology, стр. 47-61. Springer, (2018)Privacy and security - Answering the wrong questions is no answer.. Commun. ACM, 52 (6): 22-24 (2009)Enhancing Passwords Security Using Deceptive Covert Communication., , и . SEC, том 455 из IFIP Advances in Information and Communication Technology, стр. 159-173. Springer, (2015)Applying Genetic Programming to Intrusion Detection, и . Working Notes for the AAAI Symposium on Genetic Programming, стр. 1--8. MIT, Cambridge, MA, USA, AAAI, (10--12 November 1995)Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords., , , , и . ACM Trans. Priv. Secur., 19 (3): 9:1-9:30 (2016)Critical Slicing for Software Fault Localization., , и . ISSTA, стр. 121-134. ACM, (1996)