From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Certificate Revocation Problem in the Maritime Sector., , , и . NordSec, том 12556 из Lecture Notes in Computer Science, стр. 142-157. Springer, (2020)Spam filter optimality based on signal detection theory., , , и . SIN, стр. 219-224. ACM, (2009)What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios., , , и . Cyber Security, стр. 1-8. IEEE, (2020)New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities., , , и . WiSec, стр. 221-231. ACM, (2019)On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks., , , и . WISEC, стр. 75-86. ACM, (2018)An Analysis of the Asprox Botnet.. SECURWARE, стр. 148-153. IEEE Computer Society, (2010)New privacy issues in mobile telephony: fix and verification., , , , , , и . CCS, стр. 205-216. ACM, (2012)Software Bill of Materials in Critical Infrastructure., , , , и . CloudCom, стр. 319-324. IEEE, (2023)New paradigms for access control in constrained environments., , , , и . ReCoSoC, стр. 1-4. IEEE, (2014)Architectures for Enhancing Authentication Privacy and Security using Trusted Computing., , , и . SysTEX@SOSP, стр. 10:1-10:7. ACM, (2017)