From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet Security: Intrusion Detection and Prevention: Minitrack Introduction., и . HICSS, IEEE Computer Society, (2004)Reflections on Operating in Hostile Environments., , и . HICSS, IEEE Computer Society, (2004)Designing an Optimized Alert System Based on Geospatial Location Data., , и . HICSS, стр. 4159-4168. IEEE Computer Society, (2014)DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses., , , и . MTD@CCS, стр. 77-84. ACM, (2015)The privacy implications of stateless IPv6 addressing., , , и . CSIIRW, стр. 52. ACM, (2010)Utilizing the BitTorrent DHT for blind rendezvous and information exchange., , , и . MILCOM, стр. 1560-1565. IEEE, (2015)The Blind Man's Bluff Approach to Security Using IPv6., , , , и . IEEE Secur. Priv., 10 (4): 35-43 (2012)Leveraging Cognitive Principles to Improve Security Visualization., , , и . NDT (2), том 294 из Communications in Computer and Information Science, стр. 262-276. Springer, (2012)Mobile Device Profiling and Intrusion Detection Using Smart Batteries., , , , , и . HICSS, стр. 296. IEEE Computer Society, (2008)Scaling IPv6 address bindings in support of a moving target defense., , , и . ICITST, стр. 440-445. IEEE, (2014)