From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying the layered decision model to the design of language-based security systems., и . IRI, стр. 182-187. IEEE Systems, Man, and Cybernetics Society, (2006)Mechanical Verification of Secure Distributed Systems in Higher Order Logic., и . TPHOLs, стр. 263-278. IEEE Computer Society, (1991)Formal Reasoning About Intrusion Detection Systems., , , , и . RAID, том 3224 из Lecture Notes in Computer Science, стр. 278-295. Springer, (2004)Formal Grammar for Java., и . Formal Syntax and Semantics of Java, том 1523 из Lecture Notes in Computer Science, стр. 1-40. Springer, (1999)Assessing Computer Security Vulnerability., и . ACM SIGOPS Oper. Syst. Rev., 29 (3): 3-13 (1995)Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking., , и . ICSS, стр. 11-20. ACM, (2019)The verification of secure distributed systems., и . Compcon, стр. 177-184. IEEE Computer Society, (1991)A Structured Analysis of SQL Injection Runtime Mitigation Techniques., , и . HICSS, стр. 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)An overview of SNIF: a tool for Surveying Network Information Flow.. NDSS, стр. 94-101. IEEE Computer Society, (1995)Formal Methods and Industry - Introduction., и . HICSS, IEEE Computer Society, (1999)