From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Policy Machine for Security Policy Management., , и . International Conference on Computational Science (2), том 2074 из Lecture Notes in Computer Science, стр. 494-506. Springer, (2001)Cognitive task analysis of network analysts and managers for network situational awareness., , , , и . VDA, том 7530 из SPIE Proceedings, стр. 75300. SPIE, (2010)Who Owns Your Computer?, и . IEEE Secur. Priv., 4 (2): 61-63 (2006)Joining the Security Education Community., и . IEEE Secur. Priv., 2 (5): 61-63 (2004)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , и . ACM Conference on Computer and Communications Security, стр. 154-164. ACM, (1993)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 188-202. Springer, (2010)Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory., и . ACM Southeast Regional Conference (2), стр. 142-147. ACM, (2005)1-59593-059-0.Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , и . SECRYPT, стр. 546-553. INSTICC Press, (2008)Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks., , , , , и . HCI (16), том 5638 из Lecture Notes in Computer Science, стр. 138-147. Springer, (2009)Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , и . ICDCS Workshops, стр. 144-151. IEEE Computer Society, (2005)