From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance analysis of untraceability protocols for mobile agents using an adaptable framework., и . AAMAS, стр. 1063-1070. ACM, (2006)Tool support for detecting defects in object-oriented models., , , , и . Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer, (2005)Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis., и . ICISS, том 12553 из Lecture Notes in Computer Science, стр. 267-287. Springer, (2020)Untraceability of mobile agents., и . AAMAS, стр. 1233-1234. ACM, (2005)Security information sharing for smart grids: Developing the right data model., и . ICITST, стр. 163-169. IEEE, (2014)Evaluation of open source SIEM for situation awareness platform in the smart grid environment., и . WFCS, стр. 1-4. IEEE, (2015)Cybersecurity and privacy in standards for smart grids - A comprehensive survey.. Comput. Stand. Interfaces, (2018)Approach to security assessment of critical infrastructures' information systems., , и . IET Inf. Secur., 5 (3): 135-144 (2011)Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study.. SecureComm (2), том 336 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 268-274. Springer, (2020)MAISim: mobile agent malware simulator., , и . SimuTools, стр. 35. ICST/ACM, (2008)