Author of the publication

Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2.

, , and . ICITST, page 355-360. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Fault Tree Analysis with Cobit 5 Risk Scenarios., , and . CoDIT, page 385-390. IEEE, (2018)A Study of the Methods for Improving Internet Usage Policy Compliance., and . CSE (3), page 371-378. IEEE Computer Society, (2009)Angular multichannel sigma filter., , , , and . ICASSP (3), page 745-748. IEEE, (2003)A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score., , , and . WorldCIS, page 109-113. IEEE, (2011)Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning., , and . TrustCom/BigDataSE, page 1560-1564. IEEE, (2018)An Analysis of CVSS v2 Environmental Scoring., , , and . SocialCom/PASSAT, page 1125-1130. IEEE Computer Society, (2011)Comparative Analysis of ccTLD Security Policies., , , , and . SocialCom/PASSAT, page 926-933. IEEE Computer Society, (2010)An Enhanced Threat Identification Approach for Collusion Threats., , , and . Metrisec@ESEM, page 25-30. IEEE, (2011)Private Blockchain Network for IoT Device Firmware Integrity Verification and Update., , and . HASE, page 164-170. IEEE, (2019)SCAP benchmark for Cisco router security configuration compliance., , and . ICITST, page 270-276. IEEE, (2015)