From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Misconfiguration Management of Network Security Components., , и . CoRR, (2019)A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags., , и . Wireless Personal Communications, 59 (1): 27-42 (2011)Spyware-Based Menaces Against Web Applications., и . INCoS, стр. 409-412. IEEE Computer Society, (2009)Learning to Communicate Underwater: An Exploration of Limited Mobility Agents., , , и . WUWNet, стр. 2:1-2:5. ACM, (2017)Towards an Automated and Dynamic Risk Management Response System., , , , , и . NordSec, том 10014 из Lecture Notes in Computer Science, стр. 37-53. (2016)Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition., , и . ADHOC-NOW, том 12338 из Lecture Notes in Computer Science, стр. 55-70. Springer, (2020)Selection of Mitigation Actions Based on Financial and Operational Impact Assessments., , , и . ARES, стр. 137-146. IEEE Computer Society, (2016)Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks., , и . ARES, стр. 21-28. IEEE Computer Society, (2016)Switched-based Control Testbed to Assure Cyber-physical Resilience by Design., , , и . SECRYPT, стр. 681-686. SCITEPRESS, (2022)Metrics to Enhance the Resilience of Cyber-Physical Systems., , , , и . TrustCom, стр. 1167-1172. IEEE, (2020)