From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An architecture for adaptive intrusion-tolerant applications., , , , , , , , , и 3 other автор(ы). Softw. Pract. Exp., 36 (11-12): 1331-1354 (2006)Message Passing for Distributed QoS-Security Tradeoffs., , и . Comput. J., 57 (6): 840-855 (2014)Usable Survivability., , , и . INC, стр. 209-212. University of Plymouth, (2010)Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience., , , , , , и . ICDCS Workshops, стр. 104-. IEEE Computer Society, (2003)Using Distributed Ledgers For Command and Control - Concepts and Challenges., , , и . MILCOM, стр. 55-60. IEEE, (2021)Applying distributed optimization for QoS-security tradeoff in a distributed information system., , , , и . AAMAS, стр. 1261-1262. IFAAMAS, (2013)Middleware for runtime assessment of information assurance., , и . Middleware (Industry Track), стр. 23-28. ACM, (2010)Packaging Quality of Service Control Behaviors for Reuse., , , и . Symposium on Object-Oriented Real-Time Distributed Computing, стр. 375-385. IEEE Computer Society, (2002)Learning from Early Attempts to Measure Information Security Performance., , , , , , и . CSET, USENIX Association, (2012)Avoiding common security flaws in composed service-oriented systems., , , и . DSN Workshops, стр. 1-6. IEEE Computer Society, (2012)