From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive Cyberdefense for Survival and Intrusion Tolerance., , , , , и . IEEE Internet Comput., 8 (6): 25-33 (2004)An architecture for adaptive intrusion-tolerant applications., , , , , , , , , и 3 other автор(ы). Softw. Pract. Exp., 36 (11-12): 1331-1354 (2006)Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing., , , и . NCA, стр. 285-292. IEEE Computer Society, (2006)Using a Cognitive Architecture to Automate Cyberdefense Reasoning., , , , и . BLISS, стр. 58-63. IEEE Computer Society, (2008)Survivability Architecture of a Mission Critical System: The DPASA Example., , , , и . ACSAC, стр. 495-504. IEEE Computer Society, (2005)Survival by defense-enabling., , и . NSPW, стр. 71-78. ACM, (2001)Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response., , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 408-409. Springer, (2008)Protecting Applications Against Malice Using AdaptiveMiddleware., , , , и . Certification and Security in E-Services, том 255 из IFIP Conference Proceedings, стр. 73-108. Kluwer, (2002)Building Adaptive and Agile Applications Using Intrusion Detection and Response., , , и . NDSS, The Internet Society, (2000)An abstract interface for cyber-defense mechanisms., , , и . CSIIRW, стр. 37:1-37:3. ACM, (2008)