From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Government-Funded R&D to Drive Cybersecurity Technologies., , , и . IT Prof., 17 (4): 62-65 (2015)A Framework for Understanding and Applying Ethical Principles in Network and Security Research., , и . Financial Cryptography Workshops, том 6054 из Lecture Notes in Computer Science, стр. 240-246. Springer, (2010)Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice., , , и . IEEE Secur. Priv., 11 (2): 14-23 (2013)Experiences Enhancing Open Source Security in the POSSE Project, , , , , , , и . Free/Open Source Software Development, Idea Group Publishing, Hershey, PA, (2004)PREDICT: a trusted framework for sharing data for cyber security research., , и . BADGERS@EuroSys, стр. 105-106. ACM, (2011)Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective.. IEEE Symposium on Security and Privacy, стр. 21-26. IEEE Computer Society, (2010)Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP.. ACSAC, стр. 193-201. IEEE, (1992)Homeland security: cyber security R&D initiatives.. CCS, стр. 1. ACM, (2005)Securing network access in wireless sensor networks., , , , и . WISEC, стр. 261-268. ACM, (2009)Working Group Report on Internet/Intranet Security.. WETICE, стр. 129-132. IEEE Computer Society, (1996)