Author of the publication

Bickering In-Depth: Rethinking the Composition of Competing Security Systems.

, , and . IEEE Secur. Priv., 7 (6): 77-81 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems., , , , and . Critical Infrastructure Protection, volume 367 of IFIP Advances in Information and Communication Technology, page 31-46. Springer, (2011)Converting an Electric Power Utility Network to Defend Against Crafted Inputs., , , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 73-85. Springer, (2019)Quantifying Application Behavior Space for Detection and Self-Healing, , , , and . CUCS-017-06. Columbia University, (2006)FLIPS: Hybrid Adaptive Intrustion Prevention, , , and . #RAID05#, (2005)On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems., , , , and . Mach. Learn., 81 (2): 179-205 (2010)The cake is a lie: privilege rings as a policy resource., , , , and . VMSec@CCS, page 33-38. ACM, (2009)Finding the Balance Between Guidance and Independence in Cybersecurity Exercises., , , , and . ASE @ USENIX Security Symposium, USENIX Association, (2016)Hands-on cybersecurity exercises and the rave virtual environment (abstract only)., , , , and . SIGCSE, page 759. ACM, (2013)SSARES: Secure Searchable Automated Remote Email Storage., , , and . ACSAC, page 129-139. IEEE Computer Society, (2007)Katana: A Hot Patching Framework for ELF Executables., , , and . ARES, page 507-512. IEEE Computer Society, (2010)