From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Regulations and Market Entry., , , и . GAMENETS, том 75 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 108-123. Springer, (2011)CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap., , и . SysSec@DIMVA, стр. 75-78. IEEE, (2011)SOWER: self-organizing wireless network for messaging., , и . WMASH, стр. 1-10. ACM, (2004)Revocation games in ephemeral networks., , , и . ACM Conference on Computer and Communications Security, стр. 199-210. ACM, (2008)Barter-based cooperation in delay-tolerant personal wireless networks., , , и . WOWMOM, стр. 1-6. IEEE Computer Society, (2007)CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot., , , , и . SmartGridSec, том 8448 из Lecture Notes in Computer Science, стр. 181-192. Springer, (2014)Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks., , , и . INFOCOM, стр. 1442-1450. IEEE, (2007)Competitive Cyber-Insurance and Internet Security., , , и . WEIS, (2009)The Long "Taile" of Typosquatting Domain Names., , , , , и . USENIX Security Symposium, стр. 191-206. USENIX Association, (2014)Mentoring Talent in IT Security-A Case Study., , и . ASE @ USENIX Security Symposium, USENIX Association, (2016)