From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , и . ICC, стр. 1-7. IEEE, (2018)Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference., , , и . IACR Cryptology ePrint Archive, (2020)Securing FPGA-based obsolete component replacement for legacy systems., , , , и . ISQED, стр. 401-406. IEEE, (2018)Hardware Assisted Chaos Based IoT Authentication., и . ICNSC, стр. 169-174. IEEE, (2019)Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment., , и . Network, 2 (1): 66-80 (2022)SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems., , , , и . DSN, стр. 1-13. IEEE, (2023)Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security., , , , и . MILCOM, стр. 841-846. IEEE, (2019)Enabling Cooperative IoT Security via Software Defined Networks (SDN)., , , , и . ICC, стр. 1-6. IEEE, (2018)Detecting Counterfeit ICs with Blockchain-based Verification Framework., , и . ISC2, стр. 1-8. IEEE, (2020)iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity., , , и . ICNC, стр. 425-431. IEEE Computer Society, (2018)