From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 1-3 (2021)Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection., , , , , , и . IEEE Access, (2021)IPv6 Covert Channels in the Wild., , и . CECC, стр. 10:1-10:6. ACM, (2019)Optimization of a peer-to-peer system for efficient content replication., и . Eur. J. Oper. Res., 196 (2): 423-433 (2009)The energy impact of security mechanisms in modern mobile devices., и . Netw. Secur., 2012 (2): 11-14 (2012)Exploiting IP telephony with silence suppression for hidden data transfers., , , , и . Comput. Secur., (2018)DockerChannel: A framework for evaluating information leakages of Docker containers., , и . SoftwareX, (декабря 2023)Code Layering for the Detection of Network Covert Channels in Agentless Systems., , , , и . IEEE Trans. Netw. Serv. Manag., 19 (3): 2282-2294 (2022)Never Mind the Malware, Here's the Stegomalware., и . IEEE Secur. Priv., 20 (5): 101-106 (2022)Recent Advancements in Digital Forensics., , и . IEEE Secur. Priv., 15 (6): 10-11 (2017)