From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Rules of Engagement for Bug Bounty Programs., , , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 138-159. Springer, (2018)Resilient observation selection in adversarial settings., , и . CDC, стр. 7416-7421. IEEE, (2015)Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach., и . CoRR, (2017)A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection., , , , и . Auton. Agents Multi Agent Syst., 33 (4): 430-456 (2019)Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces., , , , , и . CoRR, (2020)Economic Analyses of Security Investments on Cryptocurrency Exchanges., , , и . CoRR, (2019)SoK: The MITRE ATT&CK Framework in Research and Practice., , , , , и . CoRR, (2023)Data-Driven Decision Support for Optimizing Cyber Forensic Investigations., , , и . IEEE Trans. Inf. Forensics Secur., (2021)Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles., , , , , и . ACM Trans. Internet Techn., 22 (1): 7:1-7:29 (2022)Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service., , , , , и . CoRR, (2020)