From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation of locking schemes in extended dependency graphs., и . Inf. Softw. Technol., 39 (7): 477-483 (1997)BISSAM: Automatic Vulnerability Identification of Office Documents., , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 204-213. Springer, (2012)R-Tree Implementation Using Branch-Grafting Method., и . SAC (1), стр. 328-332. ACM, (2000)Klassifikation von IT-Sicherheitsvorfällen., , и . Datenschutz und Datensicherheit, 40 (1): 17-21 (2015)Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification., , и . CCSW@CCS, стр. 17-29. ACM, (2023)Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles., , и . ICPEC, том 102 из OASIcs, стр. 3:1-3:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Analyse und Vergleich von BckR2D2-I und II., , , , , , и . Sicherheit, том P-195 из LNI, стр. 47-58. GI, (2012)MalFlow: identification of C&C servers through host-based data flow profiling., , , , , и . SAC, стр. 2087-2094. ACM, (2016)IT Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken). University of Erlangen-Nuremberg, Germany, (2018)base-search.net (ftuniverlangen:oai:ub.uni-erlangen.de-opus:9219).Sharing Communities: The Good, the Bad, and the Ugly., и . CCS, стр. 2755-2769. ACM, (2023)