From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Teaching Computer Security.. SEC, том A-37 из IFIP Transactions, стр. 65-74. North-Holland, (1993)Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks., , , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 127-145. Springer, (2007)Introduction to the Inside the Insider Threat Minitrack., , и . HICSS, стр. 2728. IEEE Computer Society, (2016)Hidden Markov Models for Automated Protocol Learning., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 415-428. Springer, (2010)UNIX security in a supercomputing environment.. SC, стр. 693-698. ACM, (1989)Strong mobile device protection from loss and capture., , и . PETRA, ACM, (2009)An Analysis of the Hart Intercivic DAU eSlate., , , , , , и . EVT, USENIX Association, (2007)Privacy-Enhanced Electronic Mail.. Distributed Computing And Cryptography, том 2 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 93-106. DIMACS/AMS, (1989)Teaching secure coding: the myths and the realities., , , и . SIGCSE, стр. 281-282. ACM, (2013)The Case for Unpredictability and Deception as OS Features., , , , и . login Usenix Mag., (2015)