From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Case for Unpredictability and Deception as OS Features., , , , и . login Usenix Mag., (2015)Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense., , , и . HICSS, стр. 1-2. ScholarSpace, (2022)Defining the insider threat., и . CSIIRW, стр. 15:1-15:3. ACM, (2008)Joining the Security Education Community., и . IEEE Secur. Priv., 2 (5): 61-63 (2004)Is Anybody Home? Inferring Activity From Smart Home Network Traffic., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 245-251. IEEE Computer Society, (2016)Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs., , , , и . DIMVA, том 4064 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2006)Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis., , и . ACSAC, стр. 117-126. IEEE Computer Society, (2005)Some Problems in Sanitizing Network Data., , , , и . WETICE, стр. 307-312. IEEE Computer Society, (2006)Application of Lightweight Formal Methods to Software Security., , и . WETICE, стр. 160-165. IEEE Computer Society, (2005)A Flexible Containment Mechanism for Executing Untrusted Code., , и . USENIX Security Symposium, стр. 207-225. USENIX, (2002)