Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Power Substation Network Security and Survivability: A Work in Progress Report., , and . Security and Management, page 281-287. CSREA Press, (2003)Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation., , , , , , , , , and . ITiCSE-WGR, page 1-14. ACM, (2013)A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness., , , and . ACM Conference on Computer and Communications Security, page 39-50. ACM, (1994)An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events., and . NSPW, page 18-26. ACM, (2002)Attack Recognition for System Survivability: A Low-level Approach., and . HICSS, page 335. IEEE Computer Society, (2003)A Multi-Layered Approach to Security in High Assurance Systems., , and . HICSS, IEEE Computer Society, (2004)Cyber defense competition: enhancing student competency in information security., and . SIGITE Conference, page 305-306. ACM, (2011)Diversity as a computer defense mechanism., and . NSPW, page 11-14. ACM, (2005)Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC., , and . IICIS, volume 193 of IFIP, page 141-156. Springer, (2004)A new live video streaming approach based on Amazon S3 pricing model., , , and . CCWC, page 321-328. IEEE, (2018)