From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A three-layered model to implement data privacy policies., , , и . Comput. Stand. Interfaces, 30 (6): 398-409 (2008)Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems., , , , , и . CRITIS, том 11260 из Lecture Notes in Computer Science, стр. 113-125. Springer, (2018)Hunting the Unknown - White-Box Database Leakage Detection., , , , и . DBSec, том 8566 из Lecture Notes in Computer Science, стр. 243-259. Springer, (2014)A white-box anomaly-based framework for database leakage detection., , , , и . J. Inf. Secur. Appl., (2017)Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems., , , , , , , , , и 1 other автор(ы). Int. J. Crit. Infrastructures, 13 (2/3): 206-237 (2017)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , и . IEEE Big Data, стр. 2999-3008. IEEE, (2023)A Matter of Life and Death: Analyzing the Security of Healthcare Networks., , , , и . SEC, том 580 из IFIP Advances in Information and Communication Technology, стр. 355-369. Springer, (2020)What Websites Know About You., , и . DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 146-159. Springer, (2012)On-line trust perception: What really matters., , и . STAST, стр. 52-59. IEEE, (2011)A machine learning solution to assess privacy policy completeness: (short paper)., , , и . WPES, стр. 91-96. ACM, (2012)