Author of the publication

The Honey Community: Use of Combined Organizational Data for Community Protection.

, , and . HICSS, page 2288-2297. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GAP: An Exercise in Model Oriented Programming.. ALPUK, page 159-172. Intellect Books and Kluwer Academic Publishers, (1990)Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud., , and . IC2E, page 155-164. IEEE Computer Society, (2015)Implementing the Tate Pairing., , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 324-337. Springer, (2002)Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection., , , , and . IC2E, page 303-310. IEEE Computer Society, (2014)The Honey Community: Use of Combined Organizational Data for Community Protection., , and . HICSS, page 2288-2297. IEEE Computer Society, (2015)Certification of Public Keys within an Identity Based System., , , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 322-333. Springer, (2002)The HP time vault service: exploiting IBE for timed release of confidential information., , and . WWW, page 160-169. ACM, (2003)Introduction to the Minitrack on Cybersecurity and Privacy in Government., , and . HICSS, page 1. ScholarSpace, (2021)Introduction to Cybersecurity and Government Minitrack., , and . HICSS, page 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)Introduction to the Minitrack on Cybersecurity and Privacy in Government., , and . HICSS, page 1. ScholarSpace, (2022)