From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review., , , , , и . Sensors, 21 (24): 8415 (2021)Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation., , , и . ICSBT/SECRYPT (Revised Selected Papers), том 1849 из Communications in Computer and Information Science, стр. 122-155. Springer, (2022)Formal Analysis of Secure Device Pairing Protocols., и . NCA, стр. 291-295. IEEE Computer Society, (2014)A Formal Verification Approach to Handle Attack Graphs., , , , и . ICAART (3), стр. 125-132. SCITEPRESS, (2024)Obstruction Alternating-time Temporal Logic: A Strategic Logic to Reason about Dynamic Models., , , и . AAMAS, стр. 271-280. ACM, (2024)A Trust-Based Routing Protocol for Ad Hoc Networks., , и . MWCN, том 162 из IFIP, стр. 251-262. Kluwer/Springer, (2004)A secure and effective device pairing protocol., и . CCNC, стр. 507-512. IEEE, (2015)A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization., , , и . ACM Comput. Surv., 51 (5): 90:1-90:31 (2019)Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things., , , , и . M4IoT@Middleware, стр. 35-40. ACM, (2018)Authenticated and Privacy-Preserving Consent Management in the Internet of Things., , , и . ANT/EDI40, том 151 из Procedia Computer Science, стр. 256-263. Elsevier, (2019)