From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems., , , , , , , , , и 3 other автор(ы). J. Inf. Secur. Appl., (2020)Runtime Classification of Mobile Malware for Resource-Constrained Devices., , и . ICETE (Selected Papers), том 764 из Communications in Computer and Information Science, стр. 195-215. Springer, (2016)Intermediate solutions of second order quasilinear ordinary differential equations in the framework of regular variation., , и . Appl. Math. Comput., 219 (15): 8178-8191 (2013)A Security-enhanced Design Methodology for Embedded Systems., , и . SECRYPT, стр. 39-50. SciTePress, (2013)Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs., , , , и . IJCNN, стр. 1-8. IEEE, (2018)Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection., , , , и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 242-258. Springer, (2017)What does the memory say? Towards the most indicative features for efficient malware detection., , и . CCNC, стр. 759-764. IEEE, (2016)Modeling Requirements for Security-enhanced Design of Embedded Systems., , и . SECRYPT, стр. 315-320. SciTePress, (2014)MalAware: Effective and Efficient Run-Time Mobile Malware Detector., , и . DASC/PiCom/DataCom/CyberSciTech, стр. 270-277. IEEE Computer Society, (2016)It All Matters: Reporting Accuracy, Inference Time and Power Consumption for Face Emotion Recognition on Embedded Systems., , , , и . CoRR, (2018)