From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Cyber-Physical Attacker.. SAFECOMP Workshops, том 7613 из Lecture Notes in Computer Science, стр. 347-356. Springer, (2012)Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks., , , и . NDT (2), том 294 из Communications in Computer and Information Science, стр. 289-301. Springer, (2012)A calculus for attribute-based communication., , , , и . SAC, стр. 1840-1845. ACM, (2015)Security Games for Cyber-Physical Systems., , и . NordSec, том 8208 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2013)Availability by Design:A Complementary Approach to Denial-of-Service.. Technical University of Denmark, (2015)Expressive Power of Definite Clauses for Verifying Authenticity., и . CSF, стр. 251-265. IEEE Computer Society, (2009)