From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The challenge of detecting sophisticated attacks: Insights from SOC Analysts., , и . ARES, стр. 55:1-55:9. ACM, (2018)A State Machine System for Insider Threat Detection., , , , и . GraMSec@FLoC, том 11086 из Lecture Notes in Computer Science, стр. 111-129. Springer, (2018)Control Effectiveness: a Capture-the-Flag Study., , , , , и . ARES, стр. 87:1-87:10. ACM, (2021)Determining the Veracity of Rumours on Twitter., , , , , , и . SocInfo (1), том 10046 из Lecture Notes in Computer Science, стр. 185-205. (2016)Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things., , , , и . SIoT, стр. 5-14. IEEE Computer Society, (2015)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , и . CyberSA, стр. 1-8. IEEE, (2020)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 246-258. Springer, (2009)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , и . PrimeLife, том 352 из IFIP Advances in Information and Communication Technology, стр. 271-282. Springer, (2010)A Bayesian approach to insider threat detection., и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 48-84 (2021)Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa., , и . ICISSP, стр. 75-87. SciTePress, (2019)