Search Results - Debar, H.
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Cost Evaluation for Intrusion Response Using Dependency Graphs
Conference Proceeding -
17
-
18
-
19
Improving security management through passive network observation
Conference Proceeding -
20
Honeypots: practical means to validate malicious fault assumptions
Conference Proceeding