From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying chaos theory for runtime Hardware Trojan detection., , , и . CISDA, стр. 1-6. IEEE, (2015)On the use of design diversity in fault tolerant and secure systems: A qualitative analysis., , и . CISDA, стр. 1-8. IEEE, (2015)Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence., , , , и . CoRR, (2017)Rethinking Information Sharing for Actionable Threat Intelligence., , , , и . CoRR, (2017)Game theoretic modeling of cyber deception in the Internet of Battlefield Things.. Allerton, стр. 862. IEEE, (2018)Secure-by-synthesis network with active deception and temporal logic specifications., , , , и . CoRR, (2020)A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing., , , , , и . IPDPS, стр. 262-272. IEEE, (2019)Multi-level VM replication based survivability for mission-critical cloud computing., , , и . IM, стр. 1351-1356. IEEE, (2015)A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory., , , и . MWSCAS, стр. 853-856. IEEE, (2018)Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things., , , и . IEEE Internet Things J., 9 (4): 2678-2687 (2022)