From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk-Aware Framework for Activating and Deactivating Policy-Based Response., , , и . NSS, стр. 207-215. IEEE Computer Society, (2010)An ontology-based approach to react to network attacks., , , , , и . CRiSIS, стр. 27-35. IEEE, (2008)Optimal Distribution of Privacy Budget in Differential Privacy., , , , , и . CRiSIS, том 11391 из Lecture Notes in Computer Science, стр. 222-236. Springer, (2018)Parameterizing poisoning attacks in federated learning-based intrusion detection., , , и . ARES, стр. 104:1-104:8. ACM, (2023)Real-Time Defensive Strategy Selection via Deep Reinforcement Learning., , , , и . ARES, стр. 15:1-15:11. ACM, (2023)Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model., , , , , , , , и . FPS, том 8352 из Lecture Notes in Computer Science, стр. 209-226. Springer, (2013)A Flexible and Distributed Architecture to Enforce Dynamic Access Control., , и . SEC, том 201 из IFIP, стр. 183-195. Springer, (2006)wIDS: A Multilayer IDS for Wireless-Based SCADA Systems., , , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 387-404. Springer, (2017)Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking., , , , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 153-162. Springer, (2009)Decomposition of Multilevel Objects in an Object-Oriented Database., , , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 375-402. Springer, (1994)