Personensuche
X
?
Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science ,
1
A Revisitation of Clausewitz's Thinking from the Cyber Situ..:
, In:
?
Computer Security. ESORICS 2021 International Workshops; Lecture Notes in Computer Science ,
2
Measuring the Impact of Tactical Denial of Sustainability:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
4
CYSAS-S3 : a novel dataset for validating cyber situatio..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
5
Evaluation methodology for mission-centric cyber situationa..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
6
Denial of sustainability on military tactical clouds:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
7
Framework for Anticipatory Self-Protective 5G Environments:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
8
Adversarial Communication Networks Modeling for Intrusion D..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
9
Detecting Workload-based and Instantiation-based Economic D..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
11
A novel Self-Organizing Network solution towards Crypto-ran..:
, In:
?
2023 JNIC Cybersecurity Conference (JNIC) ,
13
European framework and proofs-of-concept for the intelliGen..:
, In:
?
14
Computer Security. ESORICS 2022 International Workshops: Cy..
Lecture Notes in Computer Science, 13785
?
Computer Security. ESORICS 2021 International Workshops; Lecture Notes in Computer Science ,
15