From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments., и . J. Netw. Comput. Appl., (2020)International Workshop on Cyber Range Technologies and Applications (CACOE 2020)., и . EuroS&P Workshops, стр. 1. IEEE, (2020)Enabling exercises, education and research with a comprehensive cyber range., , , , , , , , , и 2 other автор(ы). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 37-61 (2021)Collaborative Patterns for Workflows with Collaborative Robots., и . CoopIS, том 13591 из Lecture Notes in Computer Science, стр. 131-148. Springer, (2022)Delta Analysis of Role-Based Access Control Models.. EUROCAST (1), том 8111 из Lecture Notes in Computer Science, стр. 507-514. Springer, (2013)CISA: Establishing National Cyber Situational Awareness to Counter New Threats., , и . ERCIM News, (2016)Machine Learning Based Prediction of Frequency Hopping Spread Spectrum Signals., , , , , , и . PIMRC, стр. 1-6. IEEE, (2023)BAnDIT: Business Process Anomaly Detection in Transactions., , и . CoopIS, том 14353 из Lecture Notes in Computer Science, стр. 405-415. Springer, (2023)A Training Concept Based on a Digital Twin for a Wafer Transportation System., , , и . CBI (2), стр. 20-28. IEEE, (2021)On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations., и . CEC, стр. 128-135. IEEE Computer Society, (2010)