From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification., , , и . NPC, стр. 190-196. IEEE Computer Society, (2009)Intrusion Detection in the Cloud., , и . DASC, стр. 729-734. IEEE Computer Society, (2009)BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes., , и . Integrated Network Management, стр. 399-406. IEEE, (2011)An Extensible and Virtualization-Compatible IDS Management Architecture., , и . IAS, стр. 130-134. IEEE Computer Society, (2009)A Specialized Tool for Simulating Lock-Keeper Data Transfer., , , и . AINA, стр. 182-189. IEEE Computer Society, (2010)An Integrated Network Scanning Tool for Attack Graph Construction., , и . GPC, том 6646 из Lecture Notes in Computer Science, стр. 138-147. Springer, (2011)Remodeling Vulnerability Information., , , и . Inscrypt, том 6151 из Lecture Notes in Computer Science, стр. 324-336. Springer, (2009)Towards Unifying Vulnerability Information for Attack Graph Construction., , , и . ISC, том 5735 из Lecture Notes in Computer Science, стр. 218-233. Springer, (2009)A New Alert Correlation Algorithm Based on Attack Graph., , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 58-67. Springer, (2011)Using vulnerability information and attack graphs for intrusion detection., , и . IAS, стр. 68-73. IEEE, (2010)