From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software Failure Data Analysis of two Successive Generations of a Switching System., и . SAFECOMP, стр. 230-239. Springer, (1993)2nd workshop on open resilient human-aware cyber-physical systems., , , и . DSN Workshops, стр. 1-2. IEEE Computer Society, (2013)Availability modelling of a virtual black box for automotive systems., , и . SERENE, стр. 52-60. ACM, (2010)Smart-TV security: risk analysis and experiments on Smart-TV communication channels., , , и . J. Comput. Virol. Hacking Tech., 15 (1): 61-76 (2019)WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips., , , , , и . DSN, стр. 376-387. IEEE, (2021)Web service availability - impact of error recovery and traffic model., , и . Reliab. Eng. Syst. Saf., 89 (1): 6-16 (2005)Implementation of a Host-Based Intrusion Detection System for Avionic Applications., , , , и . PRDC, стр. 178-187. IEEE, (2019)Mirage: Towards a Metasploit-Like Framework for IoT., , , , , и . ISSRE, стр. 261-270. IEEE, (2019)On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications., , , , , и . ISSRE, стр. 358-368. IEEE, (2020)InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections., , , , , и . DSN, стр. 388-399. IEEE, (2021)