From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , и . CoRR, (2013)The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices, и . CoRR, (2012)Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems, и . CoRR, (2013)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , и . LREC, стр. 1355-1358. European Language Resources Association (ELRA), (2014)Secure Provenance: Protecting theGenealogy of Bits., , и . login Usenix Mag., (2009)Please Permit Me: Stateless Delegated Authorization in Mashups, , , , и . Proceedings of the 2008 Annual Computer Security Applications Conference, Anaheim, California, IEEE Computer Society Press, (декабря 2008)A component-based framework for radio-astronomical imaging software systems., , и . Softw. Pract. Exp., 38 (5): 493-507 (2008)Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance.. ICDH, стр. 228-233. IEEE, (2022)MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2., , и . IEEE CLOUD, стр. 487-493. IEEE Computer Society, (2012)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., и . 5GWF, стр. 383-387. IEEE, (2021)