From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

2nd Workshop on Cyber Security and Resilience of Large-Scale Systems., и . IDC, том 616 из Studies in Computational Intelligence, стр. 401. Springer, (2015)mOSAIC-Based Intrusion Detection Framework for Cloud Computing., , и . OTM Conferences (2), том 7566 из Lecture Notes in Computer Science, стр. 628-644. Springer, (2012)Intrusion Tolerance as a Service - A SLA-based Solution., и . CLOSER, стр. 375-384. SciTePress, (2012)SLA-Oriented Security Provisioning for Cloud Computing., и . CLOSER (Selected Papers), том 367 из Communications in Computer and Information Science, стр. 230-244. Springer, (2012)Semantic Support for Log Analysis of Safety-Critical Embedded Systems., , , и . CoRR, (2014)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners., , , и . Comput., 13 (2): 43 (2024)Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks., и . IEEE Syst. J., 11 (2): 460-470 (2017)When explainability turns into a threat - using xAI to fool a fake news detection method., , , , , и . Comput. Secur., (февраля 2024)Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design., , , и . Future Gener. Comput. Syst., (2017)Improving the gossiping effectiveness with distributed strategic learning (Invited paper)., , , и . Future Gener. Comput. Syst., (2017)