From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A polytope-based approach to measure the impact of events against critical infrastructures., , и . J. Comput. Syst. Sci., 83 (1): 3-21 (2017)Amapola: A Simple Infrastructure for Ubiquitous Computing., , , , , и . INTELLCOMM, том 190 из IFIP, стр. 77-86. Springer, (2005)ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks., , и . J. Inf. Secur. Appl., (2024)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , и . ITCC (1), стр. 500-505. IEEE Computer Society, (2005)Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation., , , , , и . ICICS, том 3269 из Lecture Notes in Computer Science, стр. 223-235. Springer, (2004)On the design of an FPGA-based OFDM modulator for IEEE 802.16-2004., и . ReConFig, IEEE Computer Society, (2005)Platform of intrusion management design and implementation. (Plate-forme de gestion d'intrusion: design et implémentation).. Telecom Bretagne, Brest, France, (2006)Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems., , и . Trans. Emerg. Telecommun. Technol., (2018)Educational hypermedia resources facilitator., и . Comput. Educ., 44 (3): 301-325 (2005)Switched-Based Resilient Control of Cyber-Physical Systems., , , и . IEEE Access, (2020)