Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed intrusion detection in clusters based on non-interference., and . ACSW, volume 54 of CRPIT, page 89-95. Australian Computer Society, (2006)An Improved Reference Flow Control Model for Policy-Based Intrusion Detection., , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 291-308. Springer, (2003)Experimenting with an Intrusion Detection System for Encrypted Networks., , and . Int. J. Bus. Intell. Data Min., 5 (2): 172-191 (2010)A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX., , , , and . ACSAC, page 49-58. IEEE Computer Society, (2005)Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis., , , and . NPC Workshops, page 147-154. IEEE Computer Society, (2008)Static deep error checking in large system applications using parfait., , , , , , , , , and . SIGSOFT FSE, page 432-435. ACM, (2011)Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types., , , and . NSS, page 351-356. IEEE Computer Society, (2010)Towards Intrusion Detection for Encrypted Networks., , and . ARES, page 540-545. IEEE Computer Society, (2009)Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level., , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 292-306. Springer, (2002)Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model., , and . ACSAC, page 364-373. IEEE Computer Society, (2003)