From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

From Cyber-Security Deception to Manipulation and Gratification Through Gamification., , , , , , и . HCI (29), том 11594 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2019)Labelled Network Capture Generation for Anomaly Detection., , , , и . FPS, том 12056 из Lecture Notes in Computer Science, стр. 98-113. Springer, (2019)When eHealth meets the internet of things: Pervasive security and privacy challenges., , , , и . Cyber Security, стр. 1-7. IEEE, (2017)Cyber Security Certification Programmes., , , , , , , , , и 9 other автор(ы). CSR, стр. 428-435. IEEE, (2021)Deep Learning Based Cryptographic Primitive Classification., и . CoRR, (2017)Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning., , , , и . CyberICPS/SECPRE@ESORICS, том 11387 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2018)A Security Perspective on Unikernels., , , , , , , и . Cyber Security, стр. 1-7. IEEE, (2020)Augmented Reality Intelligent Lighting Smart Spaces., , , и . NextComp, стр. 1-5. IEEE, (2019)Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units., , , , и . SIN, стр. 166-173. ACM, (2016)Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies., , , , и . CSR, стр. 194-199. IEEE, (2023)