From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A declarative approach for global network security configuration verification and evaluation., и . Integrated Network Management, стр. 531-538. IEEE, (2011)A formal model for verifying stealthy attacks on state estimation in power grids., , и . SmartGridComm, стр. 414-419. IEEE, (2013)Formal synthesis of dependable configurations for advanced metering infrastructures., и . SmartGridComm, стр. 289-294. IEEE, (2015)A formal model for sustainable vehicle-to-grid management., , и . SEGS@CCS, стр. 81-92. ACM, (2013)A game-theoretic approach for deceiving Remote Operating System Fingerprinting., , и . CNS, стр. 73-81. IEEE, (2013)Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs., , и . Comput. Networks, (июня 2023)Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives., , , , , , и . IEEE Trans. Netw. Serv. Manag., 20 (1): 138-151 (марта 2023)Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units., , , , , и . CoRR, (2018)On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , и . CoRR, (2020)A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems., , , , и . CoRR, (2021)