From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data Querying and Access Control for Secure Multiparty Computation., , и . CoRR, (2019)The Case for Writing Network Drivers in High-Level Programming Languages., , , , , , , , , и 1 other автор(ы). ANCS, стр. 1-13. IEEE, (2019)Efficient Dynamic Flow Tracking for Packet Analyzers., , , и . CloudNet, стр. 1-6. IEEE, (2018)Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008., , , , , и . Comput. Sci. Res. Dev., 23 (1): 15-25 (2009)Environment Modeling and Abstraction of Network States for Cognitive Functions., , , и . NOMS, стр. 1-8. IEEE, (2020)Revisiting Benchmarking Methodology for Interconnect Devices, , , , , и . The Applied Networking Research Workshop 2016 (ANRW '16), Berlin, Germany, (июля 2016)Building Fast but Flexible Software Routers, , , , и . ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2017), Beijing, China, (мая 2017)The Amplification Threat Posed by PubliclyReachable BACnet Devices., , , , , и . J. Cyber Secur. Mobil., 6 (1): 77-104 (2017)5G URLLC: A Case Study on Low-Latency Intrusion Prevention., , , и . IEEE Commun. Mag., 58 (10): 35-41 (2020)Comparison of frameworks for high-performance packet IO, , , , и . Architectures for Networking and Communications Systems (ANCS), 2015 ACM/IEEE Symposium on, стр. 29-38. IEEE, (2015)