From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dimensional data model for early alerts of malicious activities in a CSIRT., , , , и . SPECTS, стр. 1-8. IEEE, (2017)An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence., , , , , и . Syst., 5 (4): 52 (2017)Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems., , и . Expert Syst. Appl., 238 (Part E): 122223 (марта 2024)On the Development of Strategic Games based on a Semiotic Analysis: A Case Study of an Optimized Tic-Tac-Toe., , , , , , и . ICEIS (1), стр. 425-432. SciTePress, (2016)Early Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing., , , , , и . CITI, том 883 из Communications in Computer and Information Science, стр. 240-251. Springer, (2018)Serious 3D Game over a Cluster Computing for Situated Learning of Traffic Signals., , , , , , и . DS-RT, стр. 1-10. IEEE, (2019)Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML., , , , и . Ann. des Télécommunications, 64 (5-6): 305-323 (2009)BotHook: An option against Cyberpedophilia., , , и . CSNet, стр. 1-3. IEEE, (2017)An emulation of VoD services using virtual network environments., и . ECEASST, (2009)On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key., , и . Secur. Commun. Networks, (2019)