From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reasoning about XACML policies using CSP.. SWS, стр. 28-35. ACM, (2005)A Proof-Based Method for Modelling Timed Systems., и . Ershov Memorial Conference, том 8974 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2014)Dimensions of dynamic coalitions, , , , , , , и . (2006)A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons., , , , , и . Trans. Emerg. Telecommun. Technol., (ноября 2023)Informing decision makers: facilitating communication and trust for decision makers during crises., , , , и . ISCRAM, ISCRAM Association, (2018)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , и . DSN Workshops, стр. 36-43. IEEE Computer Society, (2017)Access control and view generation for provenance graphs., , , и . Future Gener. Comput. Syst., (2015)Using a one-class compound classifier to detect in-vehicle network attacks., , и . GECCO (Companion), стр. 1926-1929. ACM, (2018)Stochastic Specification and Verification., и . IWFM, BCS, (1999)Specification and Analysis of Automata-Based Designs., , , и . IFM, том 1945 из Lecture Notes in Computer Science, стр. 176-193. Springer, (2000)