Author of the publication

Probabilistic Cost Enforcement of Security Policies.

, , , , and . STM, volume 8203 of Lecture Notes in Computer Science, page 144-159. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mallios, Yannis
add a person with the name Mallios, Yannis
 

Other publications of authors with the same name

Probabilistic Cost Enforcement of Security Policies., , , , and . STM, volume 8203 of Lecture Notes in Computer Science, page 144-159. Springer, (2013)Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors., , , and . STM, volume 7783 of Lecture Notes in Computer Science, page 17-32. Springer, (2012)Probabilistic cost enforcement of security policies., , , , and . Journal of Computer Security, 23 (6): 759-787 (2015)Persona: Network Layer Anonymity and Accountability for Next Generation Internet., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 410-420. Springer, (2009)A SIP-oriented SPIT Management Framework., and . Computers & Security, 27 (5-6): 136-153 (2008)SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned., , , , and . SEC, volume 278 of IFIP, page 381-395. Springer, (2008)