From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy Theft in the Advanced Metering Infrastructure., , и . CRITIS, том 6027 из Lecture Notes in Computer Science, стр. 176-187. Springer, (2009)Multi-vendor penetration testing in the advanced metering infrastructure., , , , и . ACSAC, стр. 107-116. ACM, (2010)Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST., , , , , и . EVT, USENIX Association, (2008)AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures., , , и . SmartGridComm, стр. 354-359. IEEE, (2012)SABOT: specification-based payload generation for programmable logic controllers., и . CCS, стр. 439-449. ACM, (2012)A Trusted Safety Verifier for Process Controller Code., , , и . NDSS, The Internet Society, (2014)Protecting portable storage with host validation., , и . CCS, стр. 651-653. ACM, (2010)Kells: a protection framework for portable data., , и . ACSAC, стр. 231-240. ACM, (2010)Disk-enabled authenticated encryption., , и . MSST, стр. 1-6. IEEE Computer Society, (2010)Semantically rich application-centric security in Android., , , и . Secur. Commun. Networks, 5 (6): 658-673 (2012)