From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards extended safety in connected vehicles., , , и . ITSC, стр. 652-657. IEEE, (2013)EPICS: A Framework for Enforcing Security Policies in Composite Web Services., , , и . IEEE Trans. Serv. Comput., 12 (3): 415-428 (2019)Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs., , , и . CoRR, (2021)Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline., , и . CoRR, (2022)Using Garbled Circuit for Secure Brokering., и . CRiSIS, том 13204 из Lecture Notes in Computer Science, стр. 108-117. Springer, (2021)The pervasive trust foundation for security in next generation networks., , и . NSPW, стр. 129-142. ACM, (2010)The current practices of changing secure software: an empirical study., , , , и . SAC, стр. 1566-1575. ACM, (2020)A time-evolution model for the privacy degree of information disseminated in online social networks., , , и . Int. J. Commun. Networks Distributed Syst., 11 (4): 412-430 (2013)Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System., , и . CoRR, (2023)Incorporating attacker capabilities in risk estimation and mitigation., , , , и . Comput. Secur., (2015)