From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , и . CoRR, (2018)Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems., , , , и . CoRR, (2018)The case for collaborative distributed wireless intrusion detection systems., , и . GrC, стр. 782-787. IEEE, (2006)Application layer switching: a deployable technique for providing quality of service., , и . GLOBECOM, стр. 3694-3699. IEEE, (2003)An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP)., , , и . Ad Hoc Networks, 10 (7): 1238-1252 (2012)An 802.11 MAC layer covert channel., , , и . Wirel. Commun. Mob. Comput., 12 (5): 393-405 (2012)A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters., , и . IEEE Trans. Netw. Serv. Manag., 7 (4): 218-230 (2010)Using link RTT to passively detect unapproved wireless nodes., , и . Int. J. Secur. Networks, 4 (3): 153-163 (2009)Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid., , , и . IEEE Trans. Dependable Secur. Comput., 16 (6): 1026-1039 (2019)Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks., и . MASS, стр. 570-579. IEEE Computer Society, (2011)