Author of the publication

Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.

, and . DASC, page 155-162. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Data Trustworthiness via Assured Digital Signing., , , and . IEEE Trans. Dependable Secur. Comput., 9 (6): 838-851 (2012)A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm., , and . HASE, page 283-290. IEEE Computer Society, (2007)A Stochastic Model for Quantitative Security Analyses of Networked Systems., , and . CoRR, (2016)Towards an analytic model of epidemic spreading in heterogeneous systems., , and . QSHINE, page 24. ACM, (2007)Towards Quantifying the (In)Security of Networked Systems., , and . AINA, page 420-427. IEEE Computer Society, (2007)A probabilistic characterization of a fault-tolerant gossiping algorithm., , and . J. Systems Science & Complexity, 22 (1): 88-108 (2009)How to Secure Your Email Address Book and Beyond., , and . CANS, volume 4856 of Lecture Notes in Computer Science, page 228-246. Springer, (2007)Exploiting social networks for threshold signing: attack-resilience vs. availability., , and . AsiaCCS, page 325-336. ACM, (2008)A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks., and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 39-59. Springer, (2009)Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks., and . DASC, page 155-162. IEEE Computer Society, (2006)