Author of the publication

Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.

, , , and . ARES, page 157-166. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Reaction Using Risk Assessment in Intrusion Detection Systems., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 58-70. Springer, (2007)A Service Dependency Model for Cost-Sensitive Intrusion Response., , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 626-642. Springer, (2010)Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment., , , and . IAS, page 197-203. IEEE, (2010)Towards an Access-Control Metamodel for Web Content Management Systems., , , , and . ICWE Workshops, volume 8295 of Lecture Notes in Computer Science, page 148-155. Springer, (2013)FORM : A Federated Rights Expression Model for Open DRM Frameworks., , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 45-59. Springer, (2006)Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 524-529. Springer, (2014)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , and . ARES, page 157-166. IEEE Computer Society, (2016)OPA: Onion Policy Administration Model - Another approach to manage rights in DRM., , and . SEC, volume 232 of IFIP, page 349-360. Springer, (2007)Privacy Administration in Distributed Service Infrastructure., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-70. Springer, (2010)Negotiating and delegating obligations., , and . MEDES, page 281-288. ACM, (2010)