From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data Mining for Intrusion Detection., и . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)Cooperative Data Access in Multi-cloud Environments., , и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 14-28. Springer, (2011)Regulating Exceptions in Healthcare Using Policy Spaces., , , , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 254-267. Springer, (2008)Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System., , , , и . CoRR, (2018)Rule Enforcement with Third Parties in Secure Cooperative Data Access., , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 282-288. Springer, (2013)Consistent Query Plan Generation in Secure Cooperative Data Access., , и . DBSec, том 8566 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2014)Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , и . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)Minimum-cost network hardening using attack graphs., , и . Comput. Commun., 29 (18): 3812-3824 (2006)Verification of data redundancy in cloud storage., , , и . SCC@ASIACCS, стр. 11-18. ACM, (2013)