Author of the publication

Computing Cross Associations for Attack Graphs and Other Applications.

, , , and . HICSS, page 270. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Lower Bounds for Permutation Arrays Using Permutation Rational Functions., , , , and . WAIFI, volume 12542 of Lecture Notes in Computer Science, page 234-252. Springer, (2020)Stack and Queue Layouts for Toruses and Extended Hypercubes., , , and . HICSS, page 1-10. IEEE Computer Society, (2010)Information Security Education and Foundational Research., and . HICSS, page 269. IEEE Computer Society, (2007)Parallel Partition and Extension., , , and . CISS, page 1-6. IEEE, (2017)Minitrack Introduction., and . HICSS, IEEE Computer Society, (2006)Computing Cross Associations for Attack Graphs and Other Applications., , , and . HICSS, page 270. IEEE Computer Society, (2007)Combinatorial Optimization of Multicast Key Management., , , and . HICSS, page 332. IEEE Computer Society, (2003)Towards Trusted Online Dissemination of Consumer Information., , , and . HICSS, IEEE Computer Society, (2004)Calibrating an Embedded Protocol on an Asynchronous System., , , , and . IDC, volume 162 of Studies in Computational Intelligence, page 227-236. Springer, (2008)Comparing Star and Pancake Networks., and . The Essence of Computation, volume 2566 of Lecture Notes in Computer Science, page 18-36. Springer, (2002)