From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications., , , и . IEEE Trans. Dependable Secur. Comput., 1 (4): 223-237 (2004)Towards Cognitive Security Defense from Data., , и . DSN (Supplements), стр. 11-12. IEEE, (2019)Dependability Assessment of the Android OS through Fault Injection., , , и . CoRR, (2019)Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , и . WETICE, стр. 321-326. IEEE, (2019)A comprehensive study on software aging across android versions and vendors., , , и . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Virtualizing mixed-criticality systems: A survey on industrial trends and issues., , , и . Future Gener. Comput. Syst., (2022)Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators., , , , и . CoRR, (2022)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , и . CoRR, (2021)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , и . CoRR, (2022)Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform., , , и . J. Syst. Softw., (апреля 2023)