From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic building change detection through adaptive local textural features and sequential background removal., , , и . IGARSS, стр. 2857-2860. IEEE, (2016)Exploring the Representation of Cyber-Risk Data Through Sketching., , и . VizSec, стр. 22-32. IEEE, (2023)Extended Abstract - Transformers: Intrusion Detection Data in Disguise., , и . CyberICPS/SECPRE/ADIoT@ESORICS, том 12501 из Lecture Notes in Computer Science, стр. 253-263. Springer, (2020)Towards a Correct-by-Construction Design of Integrated Modular Avionics., , , , , , , , , и 2 other автор(ы). FMCAD, стр. 221-227. IEEE, (2023)Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , и . ICS-CSR, BCS, (2013)PCaaD: Towards automated determination and exploitation of industrial systems., , , , , и . Comput. Secur., (2021)ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource., , , , , , и . CSET @ USENIX Security Symposium, USENIX Association, (2020)A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software., , и . SecDev, стр. 156-170. IEEE, (2023)An Analysis of Cyber Security Attack Taxonomies., , , , и . EuroS&P Workshops, стр. 153-161. IEEE, (2018)On Demand Network Level Service Deployment in Ad Hoc Networks., , и . PWC, том 2775 из Lecture Notes in Computer Science, стр. 817-822. Springer, (2003)