From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Application Performance Assessment on Wireless Ad Hoc Networks., , , , , , , и . AINTEC, том 4311 из Lecture Notes in Computer Science, стр. 128-138. Springer, (2006)Polymorphic Ubiquitous Network Testbed RUBIQ., , , , , и . TRIDENTCOM, том 46 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 570-572. Springer, (2010)Priority based maximum consuming power control in smart homes., , , и . ISGT, стр. 1-5. IEEE, (2014)Development of a smart community simulator with individual emulation modules for community facilities and houses., , , и . GCCE, стр. 12-15. IEEE, (2015)Emulation framework for the design and development of active RFID tag systems., , , , , , и . J. Ambient Intell. Smart Environ., 2 (2): 155-177 (2010)Automated Penetration Testing Using Deep Reinforcement Learning., , и . EuroS&P Workshops, стр. 2-10. IEEE, (2020)IoT security training for system developers: Methodology and tools., , , и . Internet Things, (декабря 2023)Adaptive security awareness training using linked open data datasets., , , , , и . Educ. Inf. Technol., 25 (6): 5235-5259 (2020)Integrated framework for hands-on cybersecurity training: CyTrONE., , , , , и . Comput. Secur., (2018)Intent-Driven Secure System Design: Methodology and Implementation., , , , , , и . Comput. Secur., (2023)