From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PADUA: Parallel Architecture to Detect Unexplained Activities., , , , , и . ACM Trans. Internet Techn., 14 (1): 3:1-3:28 (2014)Hypergraph-Based Attack Models for Network Intrusion Detection., , , и . SEBD, стр. 61-68. (2014)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework., , , , , , и . BCCA, стр. 28-35. IEEE, (2023)Intrusion Detection with Hypergraph-Based Attack Models., , , и . GKR, том 8323 из Lecture Notes in Computer Science, стр. 58-73. Springer, (2013)Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques., , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 905-910. IEEE, (2023)Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios., , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 419-436. Springer, (2017)Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review., , и . PADG@ESORICS, том 11550 из Lecture Notes in Computer Science, стр. 202-226. Springer, (2018)Shortfall-Based Optimal Security Provisioning for Internet of Things., , , и . ICDCS, стр. 2585-2586. IEEE Computer Society, (2017)Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things., , , и . ICDCS, стр. 656-666. IEEE Computer Society, (2017)PUF-based Smart Tags for Supply Chain Management., , , , и . ARES, стр. 41:1-41:7. ACM, (2021)