From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How is security testing done in agile teams? A cross-case analysis of four software teams., , , , и . SE/SWM, том P-292 из LNI, стр. 133-134. GI, (2019)Enhancing Model Driven Security through Pattern Refinement Techniques., , , и . FMCO, том 7542 из Lecture Notes in Computer Science, стр. 169-183. Springer, (2011)Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing., , , и . ISoLA Workshops, том 336 из Communications in Computer and Information Science, стр. 162-180. Springer, (2011)Assessing Real-Time Malware Threats., , и . QRS Companion, стр. 6-13. IEEE, (2015)Integrating Threat Intelligence to Enhance an Organization's Information Security Management., , , и . ARES, стр. 37:1-37:8. ACM, (2018)Towards a Model- and Learning-Based Framework for Security Anomaly Detection., , , и . FMCO, том 7542 из Lecture Notes in Computer Science, стр. 150-168. Springer, (2011)Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning., , , , , и . EternalS@ECAI, том 379 из Communications in Computer and Information Science, стр. 103-116. Springer, (2012)A Systematic Literature Review of Crowdsourcing-Based Research in Information Security., , , и . SOSE, стр. 364-371. IEEE Computer Society, (2016)Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings., , , , , , , , , и 1 other автор(ы). HotSoS, стр. 38-51. ACM, (2016)How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams., , , , и . XP, том 283 из Lecture Notes in Business Information Processing, стр. 201-216. (2017)