From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A structured approach to anomaly detection for in-vehicle networks., , и . IAS, стр. 92-98. IEEE, (2010)On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain., , и . CECC, стр. 4:1-4:6. ACM, (2019)Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files., и . TrustCom/BigDataSE, стр. 466-475. IEEE, (2019)Unifying Metadata-Based Storage Reconstruction and Carving with LAYR., , , и . Digit. Investig., (2020)Forensic Computing (Dagstuhl Seminar 11401)., , , и . Dagstuhl Reports, 1 (10): 1-13 (2011)Forensic Computing (Dagstuhl Seminar 13482)., , и . Dagstuhl Reports, 3 (11): 193-208 (2013)Safe termination detection in an asynchronous distributed system when processes may crash and recover., , и . Theor. Comput. Sci., 410 (6-7): 614-628 (2009)Secure Failure Detection and Consensus in TrustedPals., , , , , , и . IEEE Trans. Dependable Secur. Comput., 9 (4): 610-625 (2012)Reconstructing People's Lives: A Case Study in Teaching Forensic Computing., , и . IMF, том P-140 из LNI, стр. 125-141. GI, (2008)Privacy threat analysis of smart metering., и . GI-Jahrestagung, том P-192 из LNI, стр. 318. GI, (2011)