From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Experimental studies of a graphical authentication system based on semantic categorisation., , , , , и . IHM, стр. 134-143. ACM, (2016)TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum., , , , и . NetSoft, стр. 321-329. IEEE, (2022)Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices., , , , , , , и . MobiCom, стр. 115:1-115:3. ACM, (2023)Internet of Things: A Definition & Taxonomy., , , , и . NGMAST, стр. 72-77. IEEE, (2015)Security and Resilience in 5G: Current Challenges and Future Directions., , и . TrustCom/BigDataSE/ICESS, стр. 1010-1015. IEEE Computer Society, (2017)On end-to-end approach for slice isolation in 5G networks. Fundamental challenges., , , , , , , и . FedCSIS, том 11 из Annals of Computer Science and Information Systems, стр. 783-792. (2017)Evaluation of the Ability to Transform SIM Applications into Hostile Applications., , , , и . CARDIS, том 7079 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2011)Security Constraints for Placement of Latency Sensitive 5G MEC Applications., , , , , , и . FiCloud, стр. 40-45. IEEE, (2022)Liability-Aware Security Management for 5G., , , , , , и . 5G World Forum, стр. 133-138. IEEE, (2020)A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems., , , , и . MIST@CCS, стр. 97-100. ACM, (2016)