From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems., , , и . CoRR, (2019)On the Memorability of System-generated PINs: Can Chunking Help?, , , , и . SOUPS, стр. 197-209. USENIX Association, (2015)ScheduLeak: A Novel Scheduler Side-Channel Attack Against Real-Time Autonomous Control Systems., , , , и . CoRR, (2018)A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems., , , , , , и . CoRR, (2017)Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning., , , и . CoRR, (2018)Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks., , , и . Canadian AI, том 12109 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2020)Towards SDN enabled network control delegation in clouds., , , , и . DSN, стр. 1-6. IEEE Computer Society, (2013)If This Context Then That Concern: Exploring users' concerns with IFTTT applets., , , , и . Proc. Priv. Enhancing Technol., 2022 (1): 166-186 (2022)CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy., и . CCS, стр. 2629-2630. ACM, (2017)False Data Detection in Distributed Oscillation Mode Estimation using Hierarchical k-means., и . SmartGridComm, стр. 1-7. IEEE, (2019)