Author of the publication

A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study.

, , , , , , and . PCI, page 328-333. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Equitably Fair On-line Auction Scheme., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 72-83. Springer, (2000)Toward early warning against Internet worms based on critical-sized networks., , , and . Secur. Commun. Networks, 6 (1): 78-88 (2013)Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems., and . WEBIST (1), page 301-304. INSTICC Press, (2008)Uncoercible e-Bidding Games., , and . Electron. Commer. Res., 4 (1-2): 113-125 (2004)Game-Based Information Security/Privacy Education and Awareness: Theory and Practice., , , and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 509-525. Springer, (2020)A Novel Stochastic Approach for Modeling Random Scanning Worms., , , and . Panhellenic Conference on Informatics, page 176-179. IEEE Computer Society, (2009)Strong Forward Security., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 109-122. Kluwer, (2001)Receipt-Freeness in Large-Scale Elections without Untappable Channels., , and . I3E, volume 202 of IFIP Conference Proceedings, page 683-693. Kluwer, (2001)Lightweight private proximity testing for geospatial social networks., , , and . Comput. Commun., (2016)PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises., , , , and . Inf., 12 (8): 318 (2021)