From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 7 (2): 60-80 (2016)Attack tree-based approach for real-time security event processing., и . Autom. Control. Comput. Sci., 49 (8): 701-704 (2015)An Approach to Ranking the Sources of Information Dissemination in Social Networks., , и . Inf., 12 (10): 416 (2021)Adaptive Touch Interface: Application for Mobile Internet Security., , , и . MobiSec, том 1121 из Communications in Computer and Information Science, стр. 53-72. Springer, (2019)Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model., , , и . MobiSec, том 1121 из Communications in Computer and Information Science, стр. 145-162. Springer, (2019)Security Metrics Based on Attack Graphs for the Olympic Games Scenario., , и . PDP, стр. 561-568. IEEE Computer Society, (2014)Augmented reality for visualizing security data for cybernetic and cyberphysical systems., , , , и . PDP, стр. 421-428. IEEE, (2020)Choosing Models for Security Metrics Visualization., , , , , и . MMM-ACNS, том 10446 из Lecture Notes in Computer Science, стр. 75-87. Springer, (2017)Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform., , и . IDC, том 1089 из Studies in Computational Intelligence, стр. 234-243. Springer, (2022)A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems., , и . IDC, том 1026 из Studies in Computational Intelligence, стр. 397-406. Springer, (2021)