Author of the publication

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.

, , , , and . CPSS@ASIACSS, page 37-48. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GLFR: A Generalized LFR Benchmark for Testing Community Detection Algorithms., , , and . ICCCN, page 1-9. IEEE, (2017)Context-Aware Orchestration of Energy-Efficient Gossip Learning Schemes., , , , and . AIIoT, page 192-198. IEEE, (2024)Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys., , and . GECCO, ACM, (2024)Reinforcement Learning With Network-Assisted Feedback for Heterogeneous RAT Selection., , and . IEEE Trans. Wirel. Commun., 16 (9): 6062-6076 (2017)Community Detection in Networks with Less Significant Community Structure., , and . ADMA, volume 10086 of Lecture Notes in Computer Science, page 65-80. (2016)ADSynth: Synthesizing Realistic Active Directory Attack Graphs., , and . DSN, page 66-74. IEEE, (2024)Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy., , , , and . CPSS@ASIACSS, page 37-48. ACM, (2015)Performance of adaptive RAT selection algorithms in 5G heterogeneous wireless networks., , and . ITNAC, page 70-75. IEEE Computer Society, (2016)A prototype of policy defined wireless access networks., , , , and . ITNAC, page 101-106. IEEE Computer Society, (2016)CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory., and . RAID, page 426-439. ACM, (2023)