From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack Difficulty Metric for Assessment of Network Security., и . ARES, стр. 44:1-44:10. ACM, (2018)A quantitative methodology for information security control gap analysis., , и . ICCCS, стр. 537-540. ACM, (2011)A two-phase quantitative methodology for enterprise information security risk analysis., , , и . CUBE, стр. 809-815. ACM, (2012)A Structured Control Selection Methodology for Insider Threat Mitigation., , и . CENTERIS/ProjMAN/HCist, том 181 из Procedia Computer Science, стр. 1187-1195. Elsevier, (2020)A Novel Software Defined Security Framework for SDN., , , , , и . CRiSIS, том 14529 из Lecture Notes in Computer Science, стр. 216-230. Springer, (2023)A Graph Data Model for Attack Graph Generation and Analysis., и . SNDS, том 420 из Communications in Computer and Information Science, стр. 239-250. Springer, (2014)GPU accelerated novel particle filtering method., , и . Computing, 96 (8): 749-773 (2014)A Quantitative Methodology for Cloud Security Risk Assessment., , и . CLOSER, стр. 92-103. SciTePress, (2017)A Formal Methodology for Modeling Threats to Enterprise Assets., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 149-166. Springer, (2014)Handling of recursion in dataflow model., , , и . ACM Annual Conference, стр. 189-196. ACM, (1984)