From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Ranathunga, Dinesha
add a person with the name Ranathunga, Dinesha
 

Другие публикации лиц с тем же именем

Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles., , , , и . IoT S&P@SIGCOMM, стр. 8-14. ACM, (2018)Modelling Computational Workload in a Maritime Combat System., , , и . MilCIS, стр. 1-6. IEEE, (2019)The Mathematical Foundations for Mapping Policies to Network Devices., , , и . SECRYPT, стр. 197-206. SciTePress, (2016)The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay., , , и . CANDAR, стр. 1-10. IEEE Computer Society, (2018)Malachite: Firewall policy comparison., , , и . ISCC, стр. 310-317. IEEE Computer Society, (2016)Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy., , , , и . CPSS@ASIACSS, стр. 37-48. ACM, (2015)Towards Standardising Firewall Reporting., , , и . CyberICS/WOS-CPS@ESORICS, том 9588 из Lecture Notes in Computer Science, стр. 127-143. Springer, (2015)Verifiable Policy-defined Networking for Security Management., , , , , , и . SECRYPT, стр. 344-351. SciTePress, (2016)Verifiable Policy-Defined Networking Using Metagraphs., , и . IEEE Trans. Dependable Secur. Comput., 19 (1): 482-494 (2022)Workload Models to Evaluate Heterogeneous Compute Environments Supporting Combat Systems., , , и . MilCIS, стр. 1-6. IEEE, (2019)