From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster)., , , и . SIN, стр. 492. ACM, (2014)Preemptive intrusion detection: theoretical framework and real-world measurements., , , , и . HotSoS, стр. 5:1-5:12. ACM, (2015)Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data., , , , и . CoRR, (2015)Efficient and Scalable Workflows for Genomic Analyses., , , , , , и . DIDC@HPDC, стр. 27-36. ACM, (2016)Live forensics for HPC systems: a case study on distributed storage systems., , , , , , , и . SC, стр. 65. IEEE/ACM, (2020)A Data-Driven Approach to Soil Moisture Collection and Prediction., , и . SMARTCOMP, стр. 1-6. IEEE Computer Society, (2016)On accelerating pair-HMM computations in programmable hardware., , , , , и . FPL, стр. 1-8. IEEE, (2017)Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants., , , , и . DSN, стр. 13-24. IEEE Computer Society, (2014)Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud., , , , и . IEEE Trans. Reliability, 66 (1): 54-75 (2017)Personalized password guessing: a new security threat., , , , , и . HotSoS, стр. 22. ACM, (2014)