Author of the publication

Ranking Attack Graphs with Graph Neural Networks.

, , , , , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 345-359. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards defining semantic foundations for purpose-based privacy policies., , , , and . CODASPY, page 213-224. ACM, (2011)On multiple watermarking., , and . MM&Sec, page 3-6. ACM, (2001)An Efficient Signature Scheme from Bilinear Pairings and Its Applications., , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 277-290. Springer, (2004)Region-Based Watermarking by Distribution Adjustment., , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 54-68. Springer, (2000)Authentication Codes in Plaintext and Chosen-content Attacks., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 254-265. Springer, (1994)On Construction of Cumulative Secret Sharing Schemes., , , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 379-390. Springer, (1998)Cryptosystems for hierarchical groups., , , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 275-286. Springer, (1996)On selectable collisionful hash functions., , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 287-298. Springer, (1996)Compression Tolerant DCT Based Image Hash., , and . ICDCS Workshops, page 562-567. IEEE Computer Society, (2003)An Algorithm for Data Hiding Using Median Cut Segmentation., , and . IEEE Pacific Rim Conference on Multimedia, volume 2532 of Lecture Notes in Computer Science, page 89-96. Springer, (2002)