From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Putting Things in Context: Securing Industrial Authentication with Context Information., , , , и . CoRR, (2019)Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions., , , , , и . Future Gener. Comput. Syst., (2019)Knowledge Rocks: Adding Knowledge Assistance to Visualization Systems., , , и . IEEE Trans. Vis. Comput. Graph., 28 (1): 1117-1127 (2022)Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks., , и . WMNC, стр. 227-232. IEEE, (2019)Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios., , , , и . CoRR, (2019)YAAS - On the Attribution of Honeypot Data., , , и . Int. J. Cyber Situational Aware., 2 (1): 31-48 (2017)Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set., , , и . CoRR, (2019)A Question of Context: Enhancing Intrusion Detection by Providing Context Information., , , и . CoRR, (2019)Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods., , , и . CoRR, (2019)The Dos and Don'ts of Industrial Network Simulation: A Field Report., , , , , и . CoRR, (2019)