From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reliability analysis of CSP specifications using Petri nets and Markov processes., , , и . HICSS (2), стр. 516-524. IEEE Computer Society, (1995)On quantum authentication protocols., , , и . GLOBECOM, стр. 5. IEEE, (2005)Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System., , и . ESM, стр. 558-563. SCS Europe, (2002)Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment., , и . Informatica (Slovenia), 28 (1): 78-89 (2004)Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation., и . SSCI, стр. 455-462. IEEE, (2015)Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation., и . Sensors, 23 (9): 4355 (2023)Specification and Analysis of Real-Time Systems Using CSP and Petri Nets., , и . Int. J. Softw. Eng. Knowl. Eng., 6 (2): 229-248 (1996)A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids., , , и . COMPSAC (2), стр. 510-515. IEEE Computer Society, (2018)978-1-5386-2667-2.Moving Toward Trustworthy Systems: R&D Essentials., и . Computer, 43 (9): 31-40 (2010)Composing, analyzing and validating software models to assess the performability of competing design candidates., и . Ann. Softw. Eng., (1999)