From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Individualizing Cybersecurity Lab Exercises with Labtainers., и . IEEE Secur. Priv., 16 (2): 91-95 (2018)The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.. IEEE Secur. Priv., 9 (6): 58-60 (2011)A 3-D Split Manufacturing Approach to Trustworthy System Development., , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 32 (4): 611-615 (2013)Trusted Hardware: Can It Be Trustworthy?, и . DAC, стр. 1-4. IEEE, (2007)A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach., и . International Information Security Workshops, том 148 из IFIP, стр. 173-180. Kluwer, (2004)Architecture for an embedded secure data base management system., , и . ACSAC, стр. 125-136. IEEE, (1990)Security Primitives for Reconfigurable Hardware-Based Systems., , , , , , , и . ACM Trans. Reconfigurable Technol. Syst., 3 (2): 10:1-10:35 (2010)A security architecture for transient trust., , , и . CSAW, стр. 1-8. ACM, (2008)MYSEA: the monterey security architecture., , , , , , , и . STC, стр. 39-48. ACM, (2009)Active Learning with the CyberCIEGE Video Game., и . CSET, USENIX Association, (2011)