From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Modeling for Security Analytics., , , , и . CISRC, стр. 22:1-22:4. ACM, (2016)Automatic Identification of Critical Digital Assets., , , и . ICDIS, стр. 219-224. IEEE, (2019)Modeling and simulation of electric power substation employing an IEC 61850 network., , и . CISR, стр. 89-92. ACM, (2014)HydroSense: A self-powered wireless device for monitoring water usage in hotel showers., , , , , , , , и . GHTC, стр. 314-320. IEEE, (2015)Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results., , и . Wireless Personal Communications, 68 (3): 619-635 (2013)Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster., , и . PEARC, стр. 5:1-5:6. ACM, (2019)Implementing an Attack Graph Generator in CUDA., , и . IPDPS Workshops, стр. 730-738. IEEE, (2020)Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce., , и . PEARC, стр. 53:1-53:4. ACM, (2017)Data Privacy Issues with RFID in Healthcare., и . Medical Data Privacy Handbook, Springer, (2015)Toward hybrid attack dependency graphs., , , и . CSIIRW, стр. 62. ACM, (2011)