From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet voting: fatally torn between conflicting goals?, и . ICEGOV, стр. 58-61. ACM, (2012)Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks., , , , , и . ICIN, стр. 21-23. IEEE, (2023)A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers., , , и . CoRR, (2023)A Structured Approach to Insider Threat Monitoring for Offensive Security Teams., , , , , и . CCNC, стр. 628-631. IEEE, (2023)Wi-Fi Sensing for Human Identification Through ESP32 Devices: An Experimental Study., , , , и . CCNC, стр. 206-209. IEEE, (2024)A Novel Approach to On-Line Status Authentication of Public-Key Certificates., и . ACSAC, стр. 270-277. IEEE Computer Society, (2000)RoboAdmin: A Different Approach to Remote System Administration., и . WOSIS, стр. 43-52. INSTICC Press, (2007)Password Similarity Using Probabilistic Data Structures., , , и . J. Cybersecur. Priv., 1 (1): 78-92 (декабря 2020)Privacy-Preserving Design of Data Processing Systems in the Public Transport Context., , , , и . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)An Integrated Application of Security Testing Methodologies to e-voting Systems., и . ePart, том 6229 из Lecture Notes in Computer Science, стр. 225-236. Springer, (2010)