From post

Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions.

, , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 66-82. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-intrusive authentication., , и . SEC, том 92 из IFIP Conference Proceedings, стр. 440-451. Chapman & Hall, (1997)Why to adopt a security metric? A brief survey., и . Quality of Protection, том 23 из Advances in Information Security, Springer, (2006)Integrity Verification of Distributed Nodes in Critical Infrastructures., , , , и . Sensors, 22 (18): 6950 (2022)The FICEP Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud., , , , и . e-Democracy, том 792 из Communications in Computer and Information Science, стр. 196-210. Springer, (2017)Decentralised Access Control in 802.11 Networks., , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2005)A study of the resetability of synchronous sequential circuits., и . Microprocess. Microprogramming, 38 (1-5): 395-402 (1993)On the Performance of Secure Vehicular Communication Systems., , , и . IEEE Trans. Dependable Secur. Comput., 8 (6): 898-912 (2011)A model of capabilities of Network Security Functions., , , , и . NetSoft, стр. 474-479. IEEE, (2022)An Estimation of Attack Surface to Evaluate Network (in)security., и . ICEIS (3), стр. 493-497. (2007)SHIELD: A novel NFV-based cybersecurity framework., , , , , , , , , и 18 other автор(ы). NetSoft, стр. 1-6. IEEE, (2017)