From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis., , , , , , и . EPS, SciTePress, (2017)Security Research at NASK: Supporting the Operational Needs of a CERT Team and More., и . SysSec@DIMVA, стр. 96-99. IEEE, (2011)Secure DRM mechanism for offline applications., и . ICMCIS, стр. 1-8. IEEE, (2015)A Two-Level Approach to Building a Campus Grid., и . PARELEC, стр. 121-126. IEEE Computer Society, (2006)Some Remarks on Security Protocols Verification Tools., , и . ISAT (2), том 522 из Advances in Intelligent Systems and Computing, стр. 65-75. (2016)Design and evaluation of a system for network threat signatures generation., и . J. Comput. Sci., (2017)Simulation of Critical ICT Infrastructure for Municipal Crisis Management., , и . CRITIS, том 5508 из Lecture Notes in Computer Science, стр. 344-351. Springer, (2008)Time Validity in Role-Based Trust Management Inference System., и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 7-15. Springer, (2011)Network traffic routing using effective bandwidth theory., и . Eur. Trans. Telecommun., 20 (7): 660-667 (2009)Mobile platform for threat monitoring in Wireless Sensor Networks., , и . WF-IoT, стр. 106-110. IEEE Computer Society, (2016)