From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Insider Threat Mitigation Using Moving Target Defense and Deception., и . MIST@CCS, стр. 93-96. ACM, (2017)A Novel Permutational Sampling Technique for Cooperative Network Scanning., и . PST, стр. 1-6. IEEE, (2019)Toward practical defense against traffic analysis attacks on encrypted DNS traffic., , , и . Comput. Secur., (2023)An Accurate and Scalable Role Mining Algorithm based on Graph Embedding and Unsupervised Feature Learning., , , и . HICSS, стр. 1-10. ScholarSpace, (2020)A Deception Planning Framework for Cyber Defense., и . HICSS, стр. 1-10. ScholarSpace, (2020)HoneyBug: Personalized Cyber Deception for Web Applications., , , и . HICSS, стр. 1-10. ScholarSpace, (2020)An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks., , и . IEEE Trans. Inf. Forensics Secur., 10 (12): 2562-2577 (2015)Random Host Mutation for Moving Target Defense., , и . SecureComm, том 106 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 310-327. Springer, (2012)On DDoS Attack Related Minimum Cut Problems., , , и . CoRR, (2014)Adversary-aware IP address randomization for proactive agility against sophisticated attackers., , и . INFOCOM, стр. 738-746. IEEE, (2015)