From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Functional Principles of Registry-based Service Discovery., , , , и . LCN, стр. 209-217. IEEE Computer Society, (2005)Comparative Metric Semantics for Commit in OR-Parallel Logic Programming., , и . ILPS, стр. 101-115. MIT Press, (1997)Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN., , , и . ICCVE, стр. 1-6. IEEE, (2019)Verifying Probabilistic Programs Using a Hoare like Logic.. ASIAN, том 1742 из Lecture Notes in Computer Science, стр. 113-125. Springer, (1999)Principles on the Security of AES against First and Second-Order Differential Power Analysis., , и . ACNS, том 6123 из Lecture Notes in Computer Science, стр. 168-185. (2010)Data Governance and Transparency for Collaborative Systems., , и . DBSec, том 9766 из Lecture Notes in Computer Science, стр. 199-216. Springer, (2016)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , и . IEEE Big Data, стр. 2999-3008. IEEE, (2023)PINPAS: A Tool for Power Analysis of Smartcards., , , , и . SEC, том 250 из IFIP Conference Proceedings, стр. 453-457. Kluwer, (2003)TRIPLEX: verifying data minimisation in communication systems., , , и . ACM Conference on Computer and Communications Security, стр. 1415-1418. ACM, (2013)Characterizing Building Automation System Attacks and Attackers., , , , и . EuroS&P Workshops, стр. 139-149. IEEE, (2022)