From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart grid protocol testing through cyber-physical testbeds., , , и . ISGT, стр. 1-6. IEEE, (2013)TCIPG: Trustworthy cyber infrastructure for the power grid overview.. ISGT, стр. 1-2. IEEE, (2012)Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment., , и . SafeConfig, стр. 71-74. ACM, (2010)Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking., , , , , , и . NDSS, The Internet Society, (2020)Modeling and analysis of worm defense using stochastic activity networks., , , и . SpringSim (3), стр. 349-355. SCS/ACM, (2007)A component-level path-based simulation approach for efficient analysis of large Markov models., , и . WSC, стр. 584-590. IEEE Computer Society, (2005)Intrusion detection in enterprise systems by combining and clustering diverse monitor data., , и . HotSoS, стр. 7-16. ACM, (2016)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 81-101. Springer, (2003)Secloud: A cloud-based comprehensive and lightweight security solution for smartphones., , , , и . Comput. Secur., (2013)Lateral Movement Detection Using Distributed Data Fusion., , , и . SRDS, стр. 21-30. IEEE Computer Society, (2016)