From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mission-oriented moving target defense based on cryptographically strong network dynamics., , , и . CSIIRW, стр. 57. ACM, (2013)Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations., , , , , и . SOUPS, стр. 237-251. USENIX Association, (2016)Model-driven, Moving-Target Defense for Enterprise Network Security., , , и . Models@run.time@Dagstuhl, том 8378 из Lecture Notes in Computer Science, стр. 137-161. Springer, (2011)Uncertainty and Risk Management in Cyber Situational Awareness., , и . Cyber Situational Awareness, том 46 из Advances in Information Security, Springer, (2010)Effective Network Vulnerability Assessment through Model Abstraction., , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2011)A Preliminary Study on Using Large Language Models in Software Pentesting., , , , , , , и . CoRR, (2024)MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD)., и . CCS, стр. 2637-2638. ACM, (2017)A scalable approach to attack graph generation., , и . CCS, стр. 336-345. ACM, (2006)Improving Attack Graph Visualization through Data Reduction and Attack Grouping., , , и . VizSEC, том 5210 из Lecture Notes in Computer Science, стр. 68-79. Springer, (2008)Aiding Intrusion Analysis Using Machine Learning., , , и . ICMLA (2), стр. 40-47. IEEE, (2013)978-0-7695-5144-9.