DEFENSE MECHANISMS
Experts
- Barbara Kordy
- Patrick Schweitzer
- Wanlei Zhou
- Sjouke Mauw
- Dong Seong Kim
- Shui Yu
- Igor V. Kotenko
- Cristina Nita-Rotaru
- Brij B. Gupta
- Yang Xiang
- Ximeng Liu
- Zhihong Tian
- Pin-Yu Chen
- Christian Rossow
- Kai Hwang
- François-Xavier Standaert
- H. Jonathan Chao
- Gürkan Gür
- Xiaojiang Du
- Choong Seon Hong
- Jelena Mirkovic
- Henrik Sandberg
- Yanbing Mao
- Sajjan G. Shiva
- Emrah Akyol
- Peter L. Reiher
- Willy Susilo
- Guanrong Chen
- Wenzhong Guo
- Zhu Han
- Mengmeng Ge
- Vishalini R. Laguduva
- Yalin E. Sagduyu
- Robin Doss
- Gang Hua
- Xue Lin
- Le Wang
- Karim Lounis
- George Kesidis
Venues
- CoRR
- IEEE Access
- ICC
- Secur. Commun. Networks
- Comput. Secur.
- IACR Cryptol. ePrint Arch.
- Future Gener. Comput. Syst.
- CNS
- CCS
- IEEE Trans. Inf. Forensics Secur.
- Comput. Networks
- Comput. Commun.
- GLOBECOM
- J. Netw. Comput. Appl.
- ACM Comput. Surv.
- ACSAC
- IEEE Trans. Dependable Secur. Comput.
- IEEE Commun. Surv. Tutorials
- CISDA
- NSS
- IEEE/ACM Trans. Netw.
- Reliab. Eng. Syst. Saf.
- DAC
- TrustCom
- Comput. Electr. Eng.
- IEEE J. Sel. Areas Commun.
- Sensors
- IEEE Trans. Parallel Distributed Syst.
- ICCCNT
- DSC
- IJCNN
- USENIX Security Symposium
- HICSS
- INFOCOM
- IEEE Trans. Netw. Sci. Eng.
- ICCCN
- CIT
- IEEE Trans. Computers
- SAC
Related Topics
Related Keywords
Popularity