From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Population-Based Incremental Learning Approach to Network Hardening., , , и . SoMeT, том 303 из Frontiers in Artificial Intelligence and Applications, стр. 941-953. IOS Press, (2018)Identifying Critical Attack Assets in Dependency Attack Graphs., и . ESORICS, том 5283 из Lecture Notes in Computer Science, стр. 18-34. Springer, (2008)A Bottom-Up Approach to Applying Graphical Models in Security Analysis.. GraMSec@CSF, том 9987 из Lecture Notes in Computer Science, стр. 1-24. Springer, (2016)A Multi-phased Multi-faceted IoT Honeypot Ecosystem., и . ACM Conference on Computer and Communications Security, стр. 2121-2123. ACM, (2020)Prioritizing intrusion analysis using Dempster-Shafer theory., , , , и . AISec, стр. 59-70. ACM, (2011)Towards a Theory of Moving Target Defense., , и . MTD@CCS, стр. 31-40. ACM, (2014)Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis., , и . CoRR, (2020)Android Malware Clustering Through Malicious Payload Mining., , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 192-214. Springer, (2017)Techniques for enterprise network security metrics., и . CSIIRW, стр. 25. ACM, (2009)Compiling Abstract Specifications into Concrete Systems - Bringing Order to the Cloud., , , , и . LISA, стр. 17-34. USENIX Association, (2014)