From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MeSSa 2017 - 4th International Workshop on Measurability of Security in Software Architectures, , и . (2017)Security Measuring for Self-adaptive Security., , и . ECSA Workshops, стр. 5:1-5:7. ACM, (2014)Evidence in the fog - Triage in fog computing systems., , , и . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301506 (марта 2023)Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time., , , и . MASS, стр. 796-803. IEEE Computer Society, (2009)Adaptive security and privacy management for the internet of things (ASPI 2013)., , и . UbiComp (Adjunct Publication), стр. 373-378. ACM, (2013)Risk-driven security metrics development for an e-health IoT application., , , , и . ISSA, стр. 1-6. IEEE, (2015)Adaptive Cybersecurity Framework for Healthcare Internet of Things., и . ISMICT, стр. 1-6. IEEE, (2019)Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems.. ISMICT, стр. 1-6. IEEE, (2019)Risk-based adaptive security for smart IoT in eHealth., и . BODYNETS, стр. 269-275. ICST / ACM, (2012)Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids., , , и . WINSYS, стр. 83-90. SCITEPRESS, (2021)