From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information., , и . Int. J. Artif. Intell. Tools, 7 (2): 319-339 (1998)Computer Security, Fault Tolerance, And Software Assurance., и . IEEE Concurr., 7 (1): 4-6 (1999)Efficient security mechanisms for overlay multicast based content delivery., , , , и . Comput. Commun., 30 (4): 793-806 (2007)A Consensus Glossary of Temporal Database Concepts., , , , , и . SIGMOD Rec., 23 (1): 52-64 (1994)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , и . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 307-328. Springer, (1992)Recoverable Encryption through a Noised Secret over a Large Cloud., , и . Trans. Large Scale Data Knowl. Centered Syst., (2013)Globally Consistent Event Ordering in One-Directional Distributed Environments., , и . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , и . CoRR, (2020)Managing attack graph complexity through visual hierarchical aggregation., и . VizSEC, стр. 109-118. ACM, (2004)