Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selected Papers from the 2017 IEEE Symposium on Security and Privacy., and . IEEE Secur. Priv., 16 (1): 10-11 (2018)Perspectives on the SolarWinds Incident., , , , , , , , , and . IEEE Secur. Priv., 19 (2): 7-13 (2021)The Growth of a Conference, a Community, and an Industry.. IEEE Secur. Priv., 14 (4): 3-5 (2016)Selected Papers From the 2021 IEEE Symposium on Security and Privacy., and . IEEE Secur. Priv., 20 (2): 8-9 (2022)Formal Policies for Trusted Processes., , and . CSFW, page 31-40. IEEE Computer Society, (1989)Experience with deter: A testbed for security research., , , , , and . TRIDENTCOM, IEEE, (2006)A Strategic Plan for Cybersecurity Research and Development.. IEEE Secur. Priv., 13 (4): 3-5 (2015)The science of cyber security experimentation: the DETER project.. ACSAC, page 137-148. ACM, (2011)First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems., , , and . CSIIRW, page 39. ACM, (2013)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)