From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Human factors related to the performance of intrusion detection operators., и . HAISA, стр. 265-275. University of Plymouth, (2015)Variables influencing the effectiveness of signature-based network intrusion detection systems., , и . Inf. Secur. J. A Glob. Perspect., 31 (6): 711-728 (2022)Skade - A Challenge Management System for Cyber Threat Hunting., , , и . ESORICS Workshops (1), том 14398 из Lecture Notes in Computer Science, стр. 84-103. Springer, (2023)Effort Estimates for Vulnerability Discovery Projects., , и . HICSS, стр. 5564-5573. IEEE Computer Society, (2012)Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models., , и . HICSS, стр. 1-10. IEEE Computer Society, (2009)Requirements engineering: The quest for the dependent variable., , и . RE, стр. 16-25. IEEE Computer Society, (2015)Decision support oriented Enterprise Architecture metamodel management using classification trees., , , , и . EDOCW, стр. 328-335. IEEE Computer Society, (2009)A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance., и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 257-271. Springer, (2013)Development and evaluation of information elements for simplified cyber-incident reports., , и . CyberSA, стр. 1-10. IEEE, (2018)Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations., , , и . J. Univers. Comput. Sci., 18 (6): 732-749 (2012)