Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On quantum authentication protocols., , , and . GLOBECOM, page 5. IEEE, (2005)Moving Toward Trustworthy Systems: R&D Essentials., and . Computer, 43 (9): 31-40 (2010)Reliability analysis of CSP specifications using Petri nets and Markov processes., , , and . HICSS (2), page 516-524. IEEE Computer Society, (1995)Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment., , and . Informatica (Slovenia), 28 (1): 78-89 (2004)Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation., and . SSCI, page 455-462. IEEE, (2015)Composing, analyzing and validating software models to assess the performability of competing design candidates., and . Ann. Softw. Eng., (1999)Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System., , and . ESM, page 558-563. SCS Europe, (2002)Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation., and . Sensors, 23 (9): 4355 (2023)Specification and Analysis of Real-Time Systems Using CSP and Petri Nets., , and . Int. J. Softw. Eng. Knowl. Eng., 6 (2): 229-248 (1996)A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids., , , and . COMPSAC (2), page 510-515. IEEE Computer Society, (2018)978-1-5386-2667-2.