From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing., , и . ICSS, стр. 24-31. ACM, (2017)Managing Security in FPGA-Based Embedded Systems., , , , , , и . IEEE Des. Test Comput., 25 (6): 590-598 (2008)Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots., , , , и . NCS, том 310 из Lecture Notes in Networks and Systems, стр. 151-162. Springer, (2021)A Model for Temporal Interval Authorizations., , , и . HICSS, IEEE Computer Society, (2006)Utilizing the Common Criteria for Advanced Student Research Projects., и . SEC, том 201 из IFIP, стр. 317-328. Springer, (2006)Teaching Industrial Control System Security Using Collaborative Projects., и . CyberICS/WOS-CPS@ESORICS, том 9588 из Lecture Notes in Computer Science, стр. 16-30. Springer, (2015)Toward a Medium-Robustness Separation Kernel Protection Profile., , , и . ACSAC, стр. 40-51. IEEE Computer Society, (2007)Hardening Honeypots for Industrial Control Systems., , и . HICSS, стр. 6665-6674. ScholarSpace, (2023)A security architecture for transient trust., , , и . CSAW, стр. 1-8. ACM, (2008)MYSEA: the monterey security architecture., , , , , , , и . STC, стр. 39-48. ACM, (2009)