From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Mathematical Foundations for Mapping Policies to Network Devices., , , и . SECRYPT, стр. 197-206. SciTePress, (2016)The Australian Digital Technologies Curriculum: Challenge and Opportunity., , и . ACE, том 148 из CRPIT, стр. 3-12. Australian Computer Society, (2014)Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy., , , , и . CPSS@ASIACSS, стр. 37-48. ACM, (2015)Towards Standardising Firewall Reporting., , , и . CyberICS/WOS-CPS@ESORICS, том 9588 из Lecture Notes in Computer Science, стр. 127-143. Springer, (2015)Malachite: Firewall policy comparison., , , и . ISCC, стр. 310-317. IEEE Computer Society, (2016)Verifiable Policy-defined Networking for Security Management., , , , , , и . SECRYPT, стр. 344-351. SciTePress, (2016)Teaching Computational Thinking in K-6: The CSER Digital Technologies MOOC., , и . ACE, том 160 из CRPIT, стр. 63-72. Australian Computer Society, (2015)