From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Java based component identification tool for measuring the strength of circuit protections., , , и . CSIIRW, стр. 26. ACM, (2010)A Systems Approach to Cyber Assurance Education., и . InfoSecCD, стр. 13-19. ACM, (2013)Evaluating component hiding techniques in circuit topologies., , , и . ICC, стр. 1138-1143. IEEE, (2012)A Method for Developing Abuse Cases and Its Evaluation., , , и . J. Softw., 11 (5): 520-527 (2016)Software Security and Randomization through Program Partitioning and Circuit Variation., , и . MTD@CCS, стр. 79-86. ACM, (2014)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , и . Autom. Softw. Eng., 29 (2): 42 (2022)Tamper Resistant Software Through Intent Protection., и . Int. J. Netw. Secur., 7 (3): 370-382 (2008)Phase space power analysis for PC-based rootkit detection., , , и . ACM Southeast Regional Conference, стр. 82-90. ACM, (2022)Introduction to the Minitrack on Cyber Operations, Defense, and Forensics., , и . HICSS, стр. 6601-6602. ScholarSpace, (2023)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , и . TrustCom/BigDataSE/ICESS, стр. 650-659. IEEE Computer Society, (2017)