Search for persons
X
?
2022 23rd IEEE International Conference on Mobile Data Management (MDM) ,
3
The Dangers of Money and Corporate Power Relating to Online..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
4
A Game-Theoretically Optimal Defense Paradigm against Traff..:
, In:
?
2022 American Control Conference (ACC) ,
5
Arbitrarily Fast Switched Distributed Stabilization of Part..:
, In:
?
2019 17th International Conference on Privacy, Security and Trust (PST) ,
8
A Novel Permutational Sampling Technique for Cooperative Ne..:
, In:
?
Proceedings of the 2017 Workshop on Moving Target Defense ,
9
WebMTD : Defeating Web Code Injection Attacks using Web ..:
, In:
?
Proceedings of the 2016 ACM Workshop on Moving Target Defense ,
10
Multi-dimensional Host Identity Anonymization for Defeating..:
, In:
?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies ,
11
Towards a General Framework for Optimal Role Mining : A ..:
, In:
?
Proceedings of the first workshop on Hot topics in software defined networks ,
12
Openflow random host mutation : transparent moving targe..:
, In:
?
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference ,
13
A gray-box DPDA-based intrusion detection technique using s..:
, In:
?
Communications in Computer and Information Science; Advances in Computer Science and Engineering ,
15