Author of the publication

Recognizing Unexplained Behavior in Network Traffic.

, , , , , , , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent Advances in Access Control Models.. WAIM, volume 2762 of Lecture Notes in Computer Science, page 1. Springer, (2003)Key management for multi-user encrypted databases., , , , , and . StorageSS, page 74-83. ACM, (2005)Implementing Semantic-Based Decomposition of Transactions., , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 75-88. Springer, (1997)An Extended Authorization Model for Relational Databases., , and . IEEE Trans. Knowl. Data Eng., 9 (1): 85-101 (1997)Modeling and assessing inference exposure in encrypted databases., , , , , and . ACM Trans. Inf. Syst. Secur., 8 (1): 119-152 (2005)A Flexible Authorization Framework for E-Commerce., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 336-345. Springer, (2004)Recoverable Encryption through a Noised Secret over a Large Cloud., , and . Trans. Large Scale Data Knowl. Centered Syst., (2013)Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information., , and . Int. J. Artif. Intell. Tools, 7 (2): 319-339 (1998)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , and . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., and . ESORICS, volume 648 of Lecture Notes in Computer Science, page 307-328. Springer, (1992)