From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Boolean Function Design Using Hill Climbing Methods., , и . ACISP, том 1587 из Lecture Notes in Computer Science, стр. 1-11. Springer, (1999)Detection of Anomalies from User Profiles Generated from System Logs., , и . AISC, том 116 из CRPIT, стр. 23-32. Australian Computer Society, (2011)Physical Protection of Cryptographic Devices.. EUROCRYPT, том 304 из Lecture Notes in Computer Science, стр. 83-93. Springer, (1987)A Framework for Improved Adolescent and Child Safety in MMOs., , и . ASONAM, стр. 33-40. IEEE Computer Society, (2010)Specification-Based Intrusion Detection in WLANs., , и . ACSAC, стр. 141-152. IEEE Computer Society, (2006)Fraud detection in ERP systems using scenario matching, , , , , , и . International Information Security Conference (SEC 2010) : Security and Privacy : Silver Linings in the Cloud, стр. 112--123. Brisbane Convention & Exhibition Centre, Brisbane, Queensland, Springer, (сентября 2010)Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer..Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 1 (1): 56-71 (2010)Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS., , и . ACSW, том 54 из CRPIT, стр. 135-144. Australian Computer Society, (2006)Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks., , и . ACSW, том 54 из CRPIT, стр. 221-230. Australian Computer Society, (2006)The LILI-II Keystream Generator., , , , , , , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 25-39. Springer, (2002)