From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks., , и . CN, том 79 из Communications in Computer and Information Science, стр. 280-289. Springer, (2010)Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML., и . CSS, том 448 из Communications in Computer and Information Science, стр. 178-192. Springer, (2014)Voter non-repudiation oriented scheme for the medium scale e-voting protocol., и . IMCSIT, стр. 325-330. IEEE, (2009)Adaptive Approach to Network Security., , и . CN, том 39 из Communications in Computer and Information Science, стр. 233-241. Springer, (2009)On Scalable Security Audit for Web Application According to ISO 27002., и . CN, том 160 из Communications in Computer and Information Science, стр. 289-297. Springer, (2011)A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks., и . SECRYPT, стр. 728-733. SCITEPRESS, (2021)Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping., , , и . CN, том 718 из Communications in Computer and Information Science, стр. 55-69. Springer, (2017)A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment., , и . FedCSIS, том 15 из Annals of Computer Science and Information Systems, стр. 391-395. (2018)How to Train People to Increase Their Security Awareness in IT., , , и . MUE/FutureTech, том 448 из Lecture Notes in Electrical Engineering, стр. 12-17. (2017)On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)., , и . Ann. UMCS Informatica, 12 (4): 69-81 (2012)