Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Sanitize Data., , , and . WETICE, page 217-222. IEEE Computer Society, (2004)Discovery of Multi-Level Security Policies., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 173-184. Kluwer, (2000)CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms., , and . KBSE, page 151-160. IEEE Computer Society, (1991)The Design and Implementation of a Data Level Database Inference Detection System., and . DBSec, volume 142 of IFIP Conference Proceedings, page 253-266. Kluwer, (1998)Protecting routing infrastructures from denial of service using cooperative intrusion detection., and . NSPW, page 94-106. ACM, (1997)A template for rapid prototyping of operating systems., , and . RSP, page 119-127. IEEE Computer Society, (1990)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , and . HUG, volume 780 of Lecture Notes in Computer Science, page 29-42. Springer, (1993)Cyber defense technology networking and evaluation., , , , , , , , , and 14 other author(s). Commun. ACM, 47 (3): 58-61 (2004)Data Level Inference Detection in Database Systems., and . CSFW, page 179-189. IEEE Computer Society, (1998)DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET., , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 249-271. Springer, (2006)