From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightweight Journaling for Scada Systems via Event Correlation., , и . Critical Infrastructure Protection, том 485 из IFIP Advances in Information and Communication Technology, стр. 99-115. (2016)Privacy-preserving demographic filtering., , , и . SAC, стр. 872-878. ACM, (2006)Ethical and Secure Data Sharing across Borders., , и . Financial Cryptography Workshops, том 7398 из Lecture Notes in Computer Science, стр. 136-140. Springer, (2012)A Modbus command and control channel., , и . SysCon, стр. 1-6. IEEE, (2016)A metadata analysis for machine-actionable Software Management Plans., , , , , , , , , и . SWAT4HCLS, том 3415 из CEUR Workshop Proceedings, стр. 145-146. CEUR-WS.org, (2023)Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems., , , и . CRiSIS, стр. 1-6. IEEE Computer Society, (2013)Follow the traffic: Stopping click fraud by disrupting the value chain., , , , , , , и . PST, стр. 464-476. IEEE, (2016)Sybil attacks as a mitigation strategy against the Storm botnet., , , и . MALWARE, стр. 32-40. IEEE Computer Society, (2008)Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings., , , и . ACM Conference on Computer and Communications Security, стр. 2246-2248. ACM, (2018)An Empirical Analysis of Risk Aversion in Malware Infections., , , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 260-267. Springer, (2017)