From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection, traceback and filtering of denial of service attacks in networked embedded systems., , , и . WESS, стр. 5:1-5:8. ACM, (2014)Towards Run-Time Security Monitoring of Distributed Industrial Control Systems., , , , и . ETFA, стр. 1-8. IEEE, (2023)Piveau: A Large-Scale Open Data Management Platform Based on Semantic Web Technologies., , , , , и . ESWC, том 12123 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2020)TERO-Based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm., , и . DSD, стр. 678-681. IEEE Computer Society, (2016)An HMM-Based Anomaly Detection Approach for SCADA Systems., и . WISTP, том 9895 из Lecture Notes in Computer Science, стр. 85-99. Springer, (2016)Leveraging Deep Learning and Online Source Sentiment for Financial Portfolio Management., , , , , , , , , и 3 other автор(ы). CoRR, (2023)Προστασία συστημάτων από κατανεμημένες επιθέσεις στο διαδίκτυο. University of Patras, Greece, (2013)National Archive of PhD Theses: oai:10442/31563.Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems., , и . NTMS, стр. 1-5. IEEE, (2011)A Civil Protection Early Warning System to Improve the Resilience of Adriatic-Ionian Territories to Natural and Man-made Risk., , , , , , , и . ETFA, стр. 1-8. IEEE, (2022)Information System Framework Architecture for Organization Agnostic Logistics Utilizing Standardized IoT Technologies., , , и . FedCSIS, том 2 из Annals of Computer Science and Information Systems, стр. 1337-1343. (2014)