From post

Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond.

, , , , и . ACM Trans. Sens. Networks, 18 (3): 40e:1-40e:3 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications., и . TrustCom/BigDataSE/ISPA (1), стр. 1129-1135. IEEE, (2015)An exploratory study of organizational cyber resilience, its precursors and outcomes., , и . J. Organ. Comput. Electron. Commer., 32 (2): 153-174 (2022)Local Editing in LZ-End Compressed Data., , , и . CoRR, (2020)Editorial: Human-Centric Security and Privacy., , , и . Frontiers Big Data, (2022)Security as a service (SecaaS) - An overview., и . The Cloud Security Ecosystem, Elsevier, (2015)A guide to homomorphic encryption., и . The Cloud Security Ecosystem, Elsevier, (2015)The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance., и . SpaCCS Workshops, том 10658 из Lecture Notes in Computer Science, стр. 180-193. Springer, (2017)A computer scientist's introductory guide to business process management (BPM).. ACM Crossroads, (2009)Computing Mod Without Mod., и . IACR Cryptology ePrint Archive, (2014)Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids., , , , , и . IEEE Trans. Smart Grid, 12 (5): 4577-4580 (2021)