From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Probabilistic Network Forensic Model for Evidence Analysis., , и . IFIP Int. Conf. Digital Forensics, том 484 из IFIP Advances in Information and Communication Technology, стр. 189-210. Springer, (2016)Identifying Evidence for Cloud Forensic Analysis., , и . IFIP Int. Conf. Digital Forensics, том 511 из IFIP Advances in Information and Communication Technology, стр. 111-130. Springer, (2017)Design of a data warehouse system for network/web services.. CIKM, стр. 473-476. ACM, (2004)Forensic Web Services., , и . IFIP Int. Conf. Digital Forensics, том 285 из IFIP, стр. 163-176. Springer, (2008)DDB: An Object Oriented Design Data Manager for VLSI CAD., , и . SIGMOD Conference, стр. 467-470. ACM Press, (1993)Techniques for enterprise network security metrics., и . CSIIRW, стр. 25. ACM, (2009)Measuring network security using dynamic bayesian network., , , и . QoP, стр. 23-30. ACM, (2008)Surviving unpatchable vulnerabilities through heterogeneous network hardening options., , , и . J. Comput. Secur., 26 (6): 761-789 (2018)Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach., , , и . J. Comput. Secur., 30 (4): 541-570 (2022)Developing A Compelling Vision for Winning the Cybersecurity Arms Race., , , и . CODASPY, стр. 220-222. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..