Author of the publication

An Asynchronous Distributed Access Control Architecture for IP over ATM Networks.

, , and . ACSAC, page 75-83. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient detection of DDoS attacks with important attributes., and . CRiSIS, page 61-67. IEEE, (2008)Detecting and Reacting against Distributed Denial of Service Attacks., , and . ICC, page 2394-2400. IEEE, (2006)Selecting Appropriate Counter-Measures in an Intrusion Detection Framework., , and . CSFW, page 78-87. IEEE Computer Society, (2004)Constructing attribute weights from computer audit data for effective intrusion detection., , and . J. Syst. Softw., 82 (12): 1974-1981 (2009)Towards Selecting Relevant Attributes using Decision Trees for Intrusion Detection., , and . HPCNCS, page 224-230. ISRST, (2007)Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing., , , and . ICST Workshops, page 34-41. IEEE Computer Society, (2014)Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures., , , , , and . CRITIS, volume 10242 of Lecture Notes in Computer Science, page 163-175. Springer, (2016)Distance Measures for Anomaly Intrusion Detection., and . Security and Management, page 17-23. CSREA Press, (2007)Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework., , , , , and . Ann. des Télécommunications, 61 (1-2): 197-217 (2006)A training-resistant anomaly detection system., , , , , and . Comput. Secur., (2018)