From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System., , , , и . PDP, стр. 609-616. IEEE Computer Society, (2016)Methodological Primitives for Phased Construction of Data Visualization Models., , и . J. Internet Serv. Inf. Secur., 5 (4): 60-84 (2015)Security Measuring System for IoT Devices., , , , , , , , и . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, том 13106 из Lecture Notes in Computer Science, стр. 256-275. Springer, (2021)Choosing Models for Security Metrics Visualization., , , , , и . MMM-ACNS, том 10446 из Lecture Notes in Computer Science, стр. 75-87. Springer, (2017)