From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET., , , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 249-271. Springer, (2006)A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.)., и . IEEE Trans. Inf. Theory, 13 (2): 335-336 (1967)CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms., , и . KBSE, стр. 151-160. IEEE Computer Society, (1991)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , и . HUG, том 780 из Lecture Notes in Computer Science, стр. 29-42. Springer, (1993)The Design and Implementation of a Data Level Database Inference Detection System., и . DBSec, том 142 из IFIP Conference Proceedings, стр. 253-266. Kluwer, (1998)Intrusion detection inter-component adaptive negotiation., , , , , , , , и . Comput. Networks, 34 (4): 605-621 (2000)Towards Applying the Composition Principle to Verify a Microkernel Operating System., , , , , и . TPHOLs, том 1125 из Lecture Notes in Computer Science, стр. 235-250. Springer, (1996)Security Policy Specification Using a Graphical Approach, , и . CoRR, (1998)Overview of applications., и . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 95-96 (1985)DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET., , и . AsiaCCS, стр. 395-397. ACM, (2007)