Author of the publication

Internet Security: Intrusion Detection and Prevention: Minitrack Introduction.

, and . HICSS, IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing an Optimized Alert System Based on Geospatial Location Data., , and . HICSS, page 4159-4168. IEEE Computer Society, (2014)Reflections on Operating in Hostile Environments., , and . HICSS, IEEE Computer Society, (2004)Internet Security: Intrusion Detection and Prevention: Minitrack Introduction., and . HICSS, IEEE Computer Society, (2004)Leveraging Cognitive Principles to Improve Security Visualization., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 262-276. Springer, (2012)The privacy implications of stateless IPv6 addressing., , , and . CSIIRW, page 52. ACM, (2010)Utilizing the BitTorrent DHT for blind rendezvous and information exchange., , , and . MILCOM, page 1560-1565. IEEE, (2015)The Blind Man's Bluff Approach to Security Using IPv6., , , , and . IEEE Secur. Priv., 10 (4): 35-43 (2012)DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses., , , and . MTD@CCS, page 77-84. ACM, (2015)Mobile Device Profiling and Intrusion Detection Using Smart Batteries., , , , , and . HICSS, page 296. IEEE Computer Society, (2008)Designing a Micro-Moving Target IPv6 Defense for the Internet of Things., , , and . IoTDI, page 179-184. ACM, (2017)