From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political., , , , , и . IEEE Technol. Soc. Mag., 30 (1): 28-38 (2011)A social dimensional cyber threat model with formal concept analysis and fact-proposition inference., , , , и . Int. J. Inf. Comput. Secur., 5 (4): 301-333 (2013)Authentication Bypass and Remote Escalated I/O Command Attacks., , и . CISR, стр. 2:1-2:7. ACM, (2015)Comparing the effectiveness of commercial obfuscators against MATE attacks., , , , и . SSPREW@ACSAC, стр. 8:1-8:11. ACM, (2016)Instrumentation of Open-Source Software for Intrusion Detection., и . RV, том 4839 из Lecture Notes in Computer Science, стр. 151-163. Springer, (2007)Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence., , , , и . SocialCom/PASSAT, стр. 967-972. IEEE Computer Society, (2010)Reverse engineering: is it art?., и . Inroads, 3 (1): 56-61 (2012)Using anomalous event patterns in control systems for tamper detection., , , и . CSIIRW, стр. 26. ACM, (2011)Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities., , , и . SocialCom/PASSAT, стр. 508-512. IEEE Computer Society, (2010)Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks., , , , и . SocialCom/PASSAT, стр. 981-986. IEEE Computer Society, (2010)