Author of the publication

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.

, , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1936-1954 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TDS - An Innovative Terrorist Detection System.. Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)Quantifying the resilience of machine learning classifiers used for cyber security., and . Expert Syst. Appl., (2018)Detection of Deviations in Mobile Applications Network Behavior, , , , and . CoRR, (2012)9-1-1 DDoS: Threat, Analysis and Mitigation., , and . CoRR, (2016)Online Social Networks: Threats and Solutions Survey, , and . CoRR, (2013)Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures., , , , and . CoRR, (2018)Cyber Security and the Role of Intelligent Systems in Addressing its Challenges., , and . ACM TIST, 8 (4): 49:1-49:12 (2017)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 223-237. Springer, (2011)9-1-1 DDoS: Attacks, Analysis and Mitigation., , and . EuroS&P, page 218-232. IEEE, (2017)