From post

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.

, , , , , и . DBSec, том 113 из IFIP Conference Proceedings, стр. 385-388. Chapman & Hall, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Modeling Computer Networks for Vulnerability Analysis., , , , , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 233-244. Kluwer, (2002)On the use of open-source firewalls in ICS/SCADA systems., и . Inf. Secur. J. A Glob. Perspect., 25 (1-3): 83-93 (2016)A SCADA Intrusion Detection Framework that Incorporates Process Semantics., и . CISRC, стр. 6:1-6:5. ACM, (2016)Modeling and simulation of electric power substation employing an IEC 61850 network., , и . CISR, стр. 89-92. ACM, (2014)Formal Analysis of E-Commerce Protocols., , , и . ISADS, стр. 19-28. IEEE Computer Society, (2001)Evaluating controller robustness using cell mapping., , и . Fuzzy Sets Syst., 121 (1): 3-12 (2001)Security Policy Coordination for Heterogeneous Information Systems., , , и . ACSAC, стр. 219-228. IEEE Computer Society, (1999)An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects., , , , , и . DBSec, том 113 из IFIP Conference Proceedings, стр. 385-388. Chapman & Hall, (1997)Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess., , , и . ICEIS (2), стр. 390-393. (2005)A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks., , , и . J. Netw. Syst. Manag., 13 (3): 253-267 (2005)