Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Ontology-Based Multi-Agent Model of an Information Security System., , , and . RSFDGrC, volume 1711 of Lecture Notes in Computer Science, page 528-532. Springer, (1999)Customized Normalcy Profiles for the Detection of Targeted Attacks., , , and . EvoApplications, volume 7248 of Lecture Notes in Computer Science, page 487-496. Springer, (2012)Colored Petri nets as the enabling technology in intrusion detection systems., , , , and . MILCOM, page 1297-1301. IEEE, (2011)Cloud Security Auditing Based on Behavioral Modeling., , , , and . SERVICES, page 268-273. IEEE Computer Society, (2013)Control System with High Robust Stability Characteristics Based on Catastrophe Function., , , , and . ICECCS, page 273-279. IEEE Computer Society, (2012)BASIS: A Biological Approach to System Information Security., , , , , , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 127-142. Springer, (2001)SVD-Based Approach to Transparent Embedding Data into Digital Images., , , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 263-274. Springer, (2001)Expressive, Efficient and Obfuscation Resilient Behavior Based IDS., , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 698-715. Springer, (2010)Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization., , and . Security and Management, page 375-385. CSREA Press, (2010)