Author of the publication

Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis.

, , , and . CyberSecurity, page 54-61. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a distributed security defence system., , and . SMC (5), page 4064-4071. IEEE, (2004)Building governments in e-government: settlement of trusted e-oligarchy.. ARES, page 1038-1044. IEEE Computer Society, (2006)Virtual Trust in Distributed Systems., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 30-39. Springer, (2004)An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems., , and . Int. J. Inf. Secur. Priv., 8 (4): 44-61 (2014)Simulating the establishment of trust infrastructures in multi-agent systems., , and . ICEC, volume 60 of ACM International Conference Proceeding Series, page 255-264. ACM, (2004)Improving trust valuation for file sharing in P2P networks., , and . SMC, page 2063-2068. IEEE, (2008)Trust metrics for survivable security systems., , and . SMC, page 3128-3135. IEEE, (2003)Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis., , , and . CyberSecurity, page 54-61. IEEE Computer Society, (2012)Dependable Security by Twisted Secret Sharing.. SEC, volume 147 of IFIP, page 193-208. Kluwer / Springer, (2004)Validating the Security of Medusa: A survivability Protocol for Security Systems., and . WOSIS, page 319-330. INSTICC Press, (2005)