From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Service Dependencies in Information Systems Security., , , и . MMM-ACNS, том 6258 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2010)Internet of Things: A Definition & Taxonomy., , , , и . NGMAST, стр. 72-77. IEEE, (2015)Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment., , , и . SEC, том 330 из IFIP Advances in Information and Communication Technology, стр. 148-160. Springer, (2010)Analyzing HTTP User Agent Anomalies for Malware Detection.. DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 187-200. Springer, (2012)Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists., , , и . SEC, том 428 из IFIP Advances in Information and Communication Technology, стр. 1-14. Springer, (2014)Assessing the risk of complex ICT systems., , , , и . Ann. des Télécommunications, 73 (1-2): 95-109 (2018)A new approach to investigate IoT threats based on a four layer model., , , , и . NOTERE, стр. 1-6. IEEE, (2016)A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System., , , , и . ICDCS Workshops, стр. 105-112. IEEE Computer Society, (2017)A Service Dependency Model for Cost-Sensitive Intrusion Response., , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 626-642. Springer, (2010)Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks., , и . ICIN, стр. 1-3. IEEE, (2022)