From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Security Framework for Industrial IoT Based on ISA 100.11a., , , , и . QSHINE, том 272 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 61-72. Springer, (2018)Session Management for Security Systems in 5G Standalone Network., , , , и . IEEE Access, (2022)5G Security Threat Assessment in Real Networks., , , , , и . Sensors, 21 (16): 5524 (2021)Towards 5G-based IoT security analysis against Vo5G eavesdropping., , , , , и . Computing, 103 (3): 425-447 (2021)IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System., , и . IEEE Access, (2020)Design and implementation of cybersecurity testbed for industrial IoT systems., , , , и . J. Supercomput., 74 (9): 4506-4520 (2018)Scenario-Based Attack Route on Industrial Control System., , , и . ICITCS, стр. 1-3. IEEE Computer Society, (2014)Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance., , , , и . Multim. Tools Appl., 79 (23-24): 16077-16091 (2020)Toward Security Enhanced Provisioning in Industrial IoT Systems., , и . Sensors, 18 (12): 4372 (2018)Recovery Measure against Disabling Reassembly Attack to DNP3 Communication., , и . IEICE Transactions, 100-D (8): 1790-1797 (2017)