From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity., и . Int. J. Cyber Warf. Terror., 6 (3): 43-52 (2016)A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination., , , , , , и . INFOCOM Workshops, стр. 1-6. IEEE, (2023)Bio-Inspired, Host-based Firewall., , , , , , и . CSE, стр. 86-91. IEEE, (2020)Who's driving you?, , и . CCNC, стр. 1-4. IEEE, (2018)Explainable Autonomic Cybersecurity For Industrial Control Systems., , , , , и . CCWC, стр. 900-9006. IEEE, (2023)Using sequential pattern mining for common event format (CEF) cyber data., , , , , и . CISRC, стр. 2:1-2:4. ACM, (2017)Detection of Tunnels in PCAP Data by Random Forests., , , , , и . CISRC, стр. 16:1-16:4. ACM, (2016)Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation., , и . ACM Trans. Embed. Comput. Syst., 14 (3): 55:1-55:22 (2015)Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach., , , , , и . Critical Infrastructure Protection, том 666 из IFIP Advances in Information and Communication Technology, стр. 103-117. Springer, (2022)Measuring and Mitigating Bias in AI-Chatbots., , , , и . ICAA, стр. 117-123. IEEE, (2022)