From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TIPS: Threat Sharing Information Platform for Enhanced Security., , , , , , и . CoRR, (2024)Multi-Label Temporal Evidential Neural Networks for Early Event Detection., , , , , , , , и . ICASSP, стр. 1-5. IEEE, (2023)Global perspectives on cybersecurity education., , , , , , , , и . ITiCSE, стр. 340-341. ACM, (2018)Threat Actor Type Inference and Characterization within Cyber Threat Intelligence., , , и . CyCon, стр. 327-352. IEEE, (2021)Optimal Trust Network Analysis with Subjective Logic., и . SECURWARE, стр. 179-184. IEEE Computer Society, (2008)Security Usability Principles for Vulnerability Analysis and Risk Assessment., , , , и . ACSAC, стр. 269-278. IEEE Computer Society, (2007)Conditional Deduction Under Uncertainty., , и . ECSQARU, том 3571 из Lecture Notes in Computer Science, стр. 824-835. Springer, (2005)A Combined Method for Mitigating Sparsity Problem in Tag Recommendation., , , и . HICSS, стр. 906-915. IEEE Computer Society, (2014)Trust Transitivity and Conditional Belief Reasoning., , и . IFIPTM, том 374 из IFIP Advances in Information and Communication Technology, стр. 68-83. Springer, (2012)Private Reputation Schemes for P2P systems., , , и . WOSIS, стр. 196-206. INSTICC Press, (2004)