From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A quantitative framework for security assurance evaluation and selection of cloud services: a case study., , и . Int. J. Inf. Sec., 22 (6): 1621-1650 (декабря 2023)Considering privacy and effectiveness of authorization policies for shared electronic health records., , , , и . IHI, стр. 553-562. ACM, (2012)Detecting Malicious Windows Commands Using Natural Language Processing Techniques., и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 157-169. Springer, (2018)Security Test Generation by Answer Set Programming., , , и . SERE, стр. 88-97. IEEE, (2014)Managing Privacy and Effectiveness of Patient-Administered Authorization Policies., , , , и . Int. J. Comput. Model. Algorithms Medicine, 3 (2): 43-62 (2012)Privacy and Access Control for IHE-Based Systems., , , , , и . eHealth, том 1 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 145-153. Springer, (2008)Towards a Model- and Learning-Based Framework for Security Anomaly Detection., , , и . FMCO, том 7542 из Lecture Notes in Computer Science, стр. 150-168. Springer, (2011)Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain., и . XAILA@JURIX, том 2381 из CEUR Workshop Proceedings, стр. 33-41. CEUR-WS.org, (2018)Difficult XSS Code Patterns for Static Code Analysis Tools., , и . IOSec/MSTEC/FINSEC@ESORICS, том 11981 из Lecture Notes in Computer Science, стр. 123-139. Springer, (2019)Automatic and Realistic Traffic Generation In A Cyber Range., , , , и . FiCloud, стр. 352-358. IEEE, (2023)