Personensuche
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
1
Trust Management Framework for Containerized Workloads Appl..:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
2
Attacker Attribution via Characteristics Inference Using Ho..:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
4
Automated Attacker Behaviour Classification Using Threat In..:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
5
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Pa..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
6
Deep Reinforcement Learning-Based Defense Strategy Selectio:
, In:
?
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion ,
8
Probabilistic Cycle Detection for Schneier's Solitaire Keys..:
, In:
?
9
Computer Security. ESORICS 2023 International Workshops: Cy..
Lecture Notes in Computer Science, 14398
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
10
A Priority-Based Domain Type Enforcement for Exception Mana..:
, In:
?
Lecture Notes in Computer Science; Risks and Security of Internet and Systems ,
11
A Posteriori Analysis of Policy Temporal Compliance:
, In:
?
Advances in Security, Networks, and Internet of Things; Transactions on Computational Science and Computational Intelligence ,
12
A Posteriori Access Control with an Administrative Policy:
, In:
?
Data and Applications Security and Privacy XXXIV; Lecture Notes in Computer Science ,
15