From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed intrusion detection in clusters based on non-interference., и . ACSW, том 54 из CRPIT, стр. 89-95. Australian Computer Society, (2006)An Improved Reference Flow Control Model for Policy-Based Intrusion Detection., , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 291-308. Springer, (2003)Experimenting with an Intrusion Detection System for Encrypted Networks., , и . Int. J. Bus. Intell. Data Min., 5 (2): 172-191 (2010)A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX., , , , и . ACSAC, стр. 49-58. IEEE Computer Society, (2005)Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis., , , и . NPC Workshops, стр. 147-154. IEEE Computer Society, (2008)Static deep error checking in large system applications using parfait., , , , , , , , , и . SIGSOFT FSE, стр. 432-435. ACM, (2011)Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types., , , и . NSS, стр. 351-356. IEEE Computer Society, (2010)Towards Intrusion Detection for Encrypted Networks., , и . ARES, стр. 540-545. IEEE Computer Society, (2009)Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level., , и . RAID, том 2516 из Lecture Notes in Computer Science, стр. 292-306. Springer, (2002)Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model., , и . ACSAC, стр. 364-373. IEEE Computer Society, (2003)