From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Review of Graph Approaches to Network Security Analytics.. From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 300-323. Springer, (2018)Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances., , и . ACSAC, стр. 350-359. IEEE Computer Society, (2004)Mission-focused cyber situational understanding via graph analytics., , , , , и . CyCon, стр. 427-448. IEEE, (2018)Dependency-Based Link Prediction for Learning Microsegmentation Policy., и . ICICS, том 13407 из Lecture Notes in Computer Science, стр. 569-588. Springer, (2022)Managing attack graph complexity through visual hierarchical aggregation., и . VizSEC, стр. 109-118. ACM, (2004)Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination., , , , и . Neural Networks, 16 (5-6): 907-914 (2003)k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks., , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 573-587. Springer, (2010)A Graph-Theoretic Visualization Approach to Network Risk Analysis., , и . VizSEC, том 5210 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2008)Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices., и . ACSAC, стр. 160-169. IEEE Computer Society, (2005)k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities., , , , и . IEEE Trans. Dependable Secur. Comput., 11 (1): 30-44 (2014)