From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness., , , , и . CoRR, (2019)Argus: Smartphone-enabled Human Cooperation via Multi-Agent Reinforcement Learning for Disaster Situational Awareness., , , , и . CoRR, (2019)Sechduler: a security-aware kernel scheduler., и . ACM Conference on Computer and Communications Security, стр. 1465-1468. ACM, (2013)Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters., , , , , и . IEEE Trans. Mob. Comput., 21 (1): 76-92 (2022)SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures., , , , , и . IEEE Trans. Smart Grid, 5 (1): 3-13 (2014)Enhancing Microgrid Resiliency Against Cyber Vulnerabilities., , , и . IAS, стр. 1-8. IEEE, (2018)OpenConduit: A Tool for Recreating Power System Communication Networks Automatically., , , , , , и . SmartGridComm, стр. 141-147. IEEE, (2022)Fed2KD: Heterogeneous Federated Learning for Pandemic Risk Assessment via Two-Way Knowledge Distillation., , , и . WONS, стр. 1-8. IEEE, (2022)Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks., , и . NDSS, The Internet Society, (2022)Cyber-physical dataset of hardware-in-the-loop cyber-physical power systems testbed under MiTM attacks., , , , , , , и . (мая 2022)