From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security System for Encrypted Environments (S2E2)., и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 505-507. Springer, (2010)An architecture for supervising COTS products., , и . CNS, стр. 403-404. IEEE, (2013)Weapons systems and cyber security - a challenging union., и . CyCon, стр. 191-203. IEEE, (2016)Blackout and now? Network Centric Warfare in an anti-access area-denial theatre., и . CyCon, стр. 169-184. IEEE, (2015)Experimental multi-FPGA GNSS receiver platform., , , , , , и . FPL, стр. 1-4. IEEE, (2014)Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic., , и . CyCon, стр. 73-94. IEEE, (2021)On the Perception of Risk Assessment in Intrusion Detection Systems., , и . DFN-Forum Kommunikationstechnologien, том P-271 из LNI, стр. 21-30. GI, (2017)An agent-based framework for decentralized reconstruction of attack paths., , , , , и . DFN-Forum Kommunikationstechnologien, том P-243 из LNI, стр. 37-46. GI, (2015)Poster: Measurement-based K-Factor Model for Vehicle-To-Vehicle Communication., , и . VNC, стр. 1-2. IEEE, (2018)Defending the grid: Backfitting non-expandable control systems., и . CyCon, стр. 1-17. IEEE, (2017)