From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning Quantitative Knowledge for Multiagent Coordination., , , и . AAAI/IAAI, стр. 24-31. AAAI Press / The MIT Press, (1999)Use of machine learning in big data analytics for insider threat detection., , , и . MILCOM, стр. 915-922. IEEE, (2015)An abstract interface for cyber-defense mechanisms., , , и . CSIIRW, стр. 37:1-37:3. ACM, (2008)Federated Access to Cyber Observables for Detection of Targeted Attacks., , , , и . MILCOM, стр. 60-66. IEEE, (2014)Adaptive Use of Network-Centric Mechanisms in Cyber-Defense., , , и . ISORC, стр. 183-192. IEEE Computer Society, (2003)Remote Management of Boundary Protection Devices with Information Restrictions., , , и . AAAI, стр. 9398-9403. AAAI Press, (2019)Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems., , , , , и . ISORC Workshops, стр. 158-165. IEEE Computer Society, (2010)Assessing trustworthiness in collaborative environments., , , и . CSIIRW, стр. 52. ACM, (2013)An architecture for adaptive intrusion-tolerant applications., , , , , , , , , и 3 other автор(ы). Softw. Pract. Exp., 36 (11-12): 1331-1354 (2006)Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience., , , , , , и . ICDCS Workshops, стр. 104-. IEEE Computer Society, (2003)