From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formalization of malware through process calculi, , и . CoRR, (2009)An ontology-based approach to react to network attacks., , , , , и . CRiSIS, стр. 27-35. IEEE, (2008)CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description., и . ICMLA, стр. 1600-1607. IEEE, (2021)An Improved Honeypot Model for Attack Detection and Analysis., и . ARES, стр. 142:1-142:10. ACM, (2023)Generative Deep Learning for Internet of Things Network Traffic Generation., , , , и . PRDC, стр. 70-79. IEEE, (2020)Conceptual Analysis of Intrusion Alarms., и . ICIAP, том 3617 из Lecture Notes in Computer Science, стр. 91-98. Springer, (2005)A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic., , , и . ACSAC, стр. 428-437. IEEE Computer Society, (2004)Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics., , и . SECRYPT, стр. 53-64. SciTePress, (2015)A Service Dependency Modeling Framework for Policy-Based Response Enforcement., , , , и . DIMVA, том 5587 из Lecture Notes in Computer Science, стр. 176-195. Springer, (2009)Combining Technical and Financial Impacts for Countermeasure Selection., , , и . AIDP, том 165 из EPTCS, стр. 1-14. (2014)