From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life., , , , и . J. Inf. Secur. Appl., (2020)Analysis of Functional Safety in a secure implementation of CAN Protocol., , и . INDIN, стр. 134-141. IEEE, (2020)CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame., и . CSE/EUC, стр. 476-481. IEEE, (2019)Exploiting Vehicles' Reputation to Mitigate DoS Attack., , и . AMARETTO@MODELSWARD, стр. 75-82. SciTePress, (2016)Enforcement of U-XACML History-Based Usage Control Policy., , , и . STM, том 9871 из Lecture Notes in Computer Science, стр. 64-81. Springer, (2016)Improving Vehicle Safety Through a Fog Collaborative Infrastructure., , , и . SMARTCOMP, стр. 446-451. IEEE Computer Society, (2018)Demo: CANDY CREAM., и . SAFECOMP Workshops, том 11699 из Lecture Notes in Computer Science, стр. 203-209. Springer, (2019)Elective temporal logic., и . QoSA/ISARCS, стр. 143-152. ACM, (2011)There are Two Sides to Every Question - Controller Versus Attacker., , и . Programming Languages with Applications to Biology and Security, том 9465 из Lecture Notes in Computer Science, стр. 304-318. Springer, (2015)CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem., , , , , и . TrustCom, стр. 1211-1218. IEEE, (2022)