From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The AURORA Gigabit Testbed., , , , , , , и . Computer Networks and ISDN Systems, 25 (6): 599-621 (1993)Security in Active Networks., , , и . Secure Internet Programming, том 1603 из Lecture Notes in Computer Science, стр. 433-451. Springer, (1999)Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities., , , и . ACSAC, стр. 251-260. ACM, (2010)Requirements for scalable access control and security management architectures., и . ACM Trans. Internet Techn., 7 (2): 8 (2007)IDES: An Internet Distance Estimation Service for Large Networks., , и . IEEE J. Sel. Areas Commun., 24 (12): 2273-2284 (2006)Moving Targets: Security and Rapid-Release in Firefox., , , и . ACM Conference on Computer and Communications Security, стр. 1256-1266. ACM, (2014)Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems., , и . CSET, USENIX Association, (2013)The STRONGMAN Architecture., , , и . DISCEX (1), стр. 178-188. IEEE Computer Society, (2003)Transparent Concurrent Execution of Mutually Exclusive Alternatives., и . ICDCS, стр. 44-52. IEEE Computer Society, (1989)Timing-based reconnaissance and defense in software-defined networks., , , , и . ACSAC, стр. 89-100. ACM, (2016)