From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and detecting anomalous topic access., , , , , и . ISI, стр. 100-105. IEEE, (2013)WSEmail., , и . Serv. Oriented Comput. Appl., 14 (1): 5-17 (2020)Privacy and Security in Mobile Health: A Research Agenda., , , и . Computer, 49 (6): 22-30 (2016)Formal software engineering., , и . ACM SIGSOFT Softw. Eng. Notes, 25 (1): 54 (2000)Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 883-894. ACM, (2016)Toward a science of learning systems: a research agenda for the high-functioning Learning Health System., , , , , , , , , и 2 other автор(ы). J. Am. Medical Informatics Assoc., 22 (1): 43-50 (2015)Safety in discretionary access control for logic-based publish-subscribe systems., , и . SACMAT, стр. 3-12. ACM, (2009)A model-based approach to integrating security policies for embedded devices., , и . EMSOFT, стр. 211-219. ACM, (2004)BEEER: distributed record and replay for medical devices in hospital operating rooms., , , и . HotSoS, стр. 1:1-1:10. ACM, (2019)Enforcing Executing-Implies-Verified with the Integrity-Aware Processor., и . TRUST, том 6740 из Lecture Notes in Computer Science, стр. 202-216. Springer, (2011)