From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A component-based framework for radio-astronomical imaging software systems., , и . Softw. Pract. Exp., 38 (5): 493-507 (2008)Please Permit Me: Stateless Delegated Authorization in Mashups, , , , и . Proceedings of the 2008 Annual Computer Security Applications Conference, Anaheim, California, IEEE Computer Society Press, (декабря 2008)Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems, и . CoRR, (2013)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , и . LREC, стр. 1355-1358. European Language Resources Association (ELRA), (2014)Secure Provenance: Protecting theGenealogy of Bits., , и . login Usenix Mag., (2009)MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2., , и . IEEE CLOUD, стр. 487-493. IEEE Computer Society, (2012)Exposing Adaptive Cruise Control in Advanced Driving Assistance Systems., и . WF-IoT, стр. 1-6. IEEE, (2022)Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies., и . WF-IoT, стр. 1-6. IEEE, (2022)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., и . 5GWF, стр. 383-387. IEEE, (2021)A conceptual framework for an IoT-based health assistant and its authorization model., , , и . CCWC, стр. 616-621. IEEE, (2018)