From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted Hardware: Can It Be Trustworthy?, и . DAC, стр. 1-4. IEEE, (2007)The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.. IEEE Secur. Priv., 9 (6): 58-60 (2011)MYSEA: the monterey security architecture., , , , , , , и . STC, стр. 39-48. ACM, (2009)A security architecture for transient trust., , , и . CSAW, стр. 1-8. ACM, (2008)ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows., , и . HICSS, стр. 6726-6735. ScholarSpace, (2023)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , и . TRUST, том 5471 из Lecture Notes in Computer Science, стр. 133-152. Springer, (2009)Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores., , , и . ESSoS, том 8978 из Lecture Notes in Computer Science, стр. 86-101. Springer, (2015)Active Learning with the CyberCIEGE Video Game., и . CSET, USENIX Association, (2011)A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach., и . International Information Security Workshops, том 148 из IFIP, стр. 173-180. Kluwer, (2004)Architecture for an embedded secure data base management system., , и . ACSAC, стр. 125-136. IEEE, (1990)