From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building components with embedded security monitors., и . QoSA/ISARCS, стр. 133-142. ACM, (2011)Detecting DNS Tunneling Using Ensemble Learning., , и . NSS, том 10394 из Lecture Notes in Computer Science, стр. 112-127. Springer, (2017)SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android., и . MALWARE, стр. 33-40. IEEE, (2018)A Taxonomy of Security as a Service., и . OTM Conferences (2), том 11230 из Lecture Notes in Computer Science, стр. 305-312. Springer, (2018)Architectural Design Decisions for Achieving Reliable Software Systems., и . ISARCS, том 6150 из Lecture Notes in Computer Science, стр. 19-32. Springer, (2010)DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations., и . SERE, стр. 98-107. IEEE, (2012)A Reputation System to Evaluate Participants for Participatory Sensing., , и . GLOBECOM, стр. 1-6. IEEE, (2016)Vehicle Software Engineering (VSE): Research and Practice., , и . IEEE Internet Things J., 7 (10): 10137-10149 (2020)WPA3 Connection Deprivation Attacks., и . CRiSIS, том 12026 из Lecture Notes in Computer Science, стр. 164-176. Springer, (2019)Secure Method Calls by Instrumenting Bytecode with Aspects., и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 126-141. Springer, (2009)