Author of the publication

Using Hierarchical Change Mining to Manage Network Security Policy Evolution.

, , , , and . Hot-ICE, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a cyber-physical topology language: applications to NERC CIP audit., , , , and . SEGS@CCS, page 93-104. ACM, (2013)Simulating Energy and Security Interactions in Semiconductor Manufacturing: Insights from the Intel Minifab Model., , , , , , and . WSC, page 3477-3488. IEEE, (2022)F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids., , , , and . DSN, page 407-418. IEEE Computer Society, (2016)XUTools: Unix Commands for Processing Next-Generation Structured Text., and . LISA, page 83-99. USENIX Association, (2012)Coastal Infrastructure Monitoring through Heterogeneous Autonomous Vehicles., , , , and . IRC, page 79-82. IEEE, (2020)Cyber-Physical Topology Language: Definition, Operations, and Application., , and . PRDC, page 60-69. IEEE Computer Society, (2015)PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure., , and . QEST, volume 9259 of Lecture Notes in Computer Science, page 70-85. Springer, (2015)An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing., , and . UCC, page 311-312. IEEE Computer Society, (2013)Security-Policy Analysis with eXtended Unix Tools.. Dartmouth College, USA, (2013)Scientific Data Management for Interconnected Critical Infrastructure Systems.. JCDL, page 192-201. IEEE, (2021)