From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A social dimensional cyber threat model with formal concept analysis and fact-proposition inference., , , , и . Int. J. Inf. Comput. Secur., 5 (4): 301-333 (2013)Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political., , , , , и . IEEE Technol. Soc. Mag., 30 (1): 28-38 (2011)Comparing the effectiveness of commercial obfuscators against MATE attacks., , , , и . SSPREW@ACSAC, стр. 8:1-8:11. ACM, (2016)Instrumentation of Open-Source Software for Intrusion Detection., и . RV, том 4839 из Lecture Notes in Computer Science, стр. 151-163. Springer, (2007)A Coherent Measurement of Web-Search Relevance., , , , и . IEEE Trans. Syst. Man Cybern. Part A, 39 (6): 1176-1187 (2009)Authentication Bypass and Remote Escalated I/O Command Attacks., , и . CISR, стр. 2:1-2:7. ACM, (2015)Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence., , , , и . SocialCom/PASSAT, стр. 967-972. IEEE Computer Society, (2010)Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities., , , и . SocialCom/PASSAT, стр. 508-512. IEEE Computer Society, (2010)Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks., , , , и . SocialCom/PASSAT, стр. 981-986. IEEE Computer Society, (2010)Reverse engineering: is it art?., и . Inroads, 3 (1): 56-61 (2012)