From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Electric Vehicle Attack Impact on Power Grid Operation., , , и . CoRR, (2021)Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques., и . CoRR, (2021)Formal Analysis of the TLS Handshake Protocol., и . SECRYPT, стр. 192-205. SciTePress, (2012)Android Malware Detection using Deep Learning on API Method Sequences., , , и . CoRR, (2017)Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids., , , , , и . IEEE Trans. Smart Grid, 11 (6): 5227-5238 (2020)Cypider: building community-based cyber-defense infrastructure for android malware detection., , , и . ACSAC, стр. 348-362. ACM, (2016)SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features., , и . Expert Syst. Appl., (сентября 2023)Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract)., , и . HSC, стр. 45. The Society for Modeling and Simulation International (SCS), (2009)On the Inference od Structured Recursive Effects with Subtyping., , и . J. Funct. Log. Program., (1997)A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds., , , , , , , и . CODASPY, стр. 79-90. ACM, (2023)