From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171)., , , и . Dagstuhl Reports, 12 (4): 54-71 (2022)Exploiting social networking sites for spam., , , , и . ACM Conference on Computer and Communications Security, стр. 693-695. ACM, (2010)InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs., , , , и . Inf. Secur. Tech. Rep., 17 (4): 227-238 (2013)Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2020"., , и . Mach. Learn. Knowl. Extr., 5 (1): 173-174 (марта 2023)Meta-framework for Automating Static Malware Analysis., , и . ERCIM News, 2022 (129): 0 (2022)XML-Based OLAP Query Processing in a Federated Data Warehouses., , , и . ICEIS (1), стр. 71-78. (2003)A New Approach To Secure Federated Information Bases Using Agent Technology., , и . J. Database Manag., 14 (1): 48-68 (2003)A Comparative Literature Review on RFID Security and Privacy., , , и . iiWAS, том 229 из books@ocg.at, стр. 213-222. Austrian Computer Society, (2007)Security in E-Learning.. iiWAS, том 170 из books@ocg.at, Austrian Computer Society, (2003)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , и . SEC, том 232 из IFIP, стр. 85-95. Springer, (2007)