From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Runtime Monitoring Environment for Mobile Java., , , и . ICST Workshops, стр. 270-278. IEEE Computer Society, (2008)A Framework for Heterogeneous Middleware Security., , , , и . IPDPS, IEEE Computer Society, (2004)Enabling Civil/Military Cooperation in Crisis Management., , , и . MILS@DSN, Zenodo, (2018)Secure Monitoring of Service Level Agreements., , , и . ARES, стр. 454-461. IEEE Computer Society, (2010)Security in WebCom: addressing naming issues for a web services architecture., и . SWS, стр. 97-105. ACM, (2004)Monitoring and Reputation Mechanisms for Service Level Agreements., , , и . GECON, том 5206 из Lecture Notes in Computer Science, стр. 125-139. Springer, (2008)A Secure Information Management and Interoperability Framework: Enabling Distributed Fusion Engines for Military IoT Applications., , , , , и . ICMCIS, стр. 1-10. IEEE, (2024)Case Study Definition and Implementation., , , , , и . Cyber-Physical Systems of Systems, том 10099 из Lecture Notes in Computer Science, Springer, (2016)Secure Component Distribution Using WebCom., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 387-398. Kluwer, (2002)Enforcing security in the AgentScape middleware., , , , и . Middleware Security, стр. 25-30. ACM, (2008)