From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Refinement-Aware Generation of Attack Trees., , , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 164-179. Springer, (2017)Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library., , , и . STM, том 11091 из Lecture Notes in Computer Science, стр. 85-101. Springer, (2018)Attack Trees with Sequential Conjunction., , , , и . SEC, том 455 из IFIP Advances in Information and Communication Technology, стр. 339-353. Springer, (2015)A model-based approach to reliability certification of services., , , и . DEST, стр. 1-6. IEEE, (2012)Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0., , , , , и . QEST, том 9826 из Lecture Notes in Computer Science, стр. 159-162. Springer, (2016)A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees., , и . STM, том 9871 из Lecture Notes in Computer Science, стр. 138-153. Springer, (2016)Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication., , , и . NSS, стр. 81-88. IEEE, (2011)Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing., и . SECRYPT, стр. 254-264. SciTePress, (2013)Supporting Security Requirements for Resource Management in Cloud Computing., , и . CSE, стр. 170-177. IEEE Computer Society, (2012)