From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Moving target defense in cloud computing: A systematic mapping study., и . Comput. Secur., (2020)Robustness Testing Techniques and Tools., , , , , и . Resilience Assessment and Evaluation of Computing Systems, Springer, (2012)Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software., , , , и . IEEE Trans. Reliab., 68 (4): 1384-1403 (2019)Editorial: Security and Dependability of Cloud Systems and Services., и . IEEE Trans. Serv. Comput., 10 (5): 673-674 (2017)Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects., , и . IEEE Access, (2021)Empirical resilience evaluation of an architecture-based self-adaptive software system., , , и . QoSA, стр. 63-72. ACM, (2014)Robustness evaluation of the rainbow framework for self-adaptation., , , , и . SAC, стр. 376-383. ACM, (2014)A data masking technique for data warehouses., , и . IDEAS, стр. 61-69. ACM, (2011)Software for embedded systems: a quality assessment based on improved ODC taxonomy., и . SAC, стр. 1780-1783. ACM, (2016)Securing Data Warehouses from Web-Based Intrusions., , , и . WISE, том 7651 из Lecture Notes in Computer Science, стр. 681-688. Springer, (2012)