From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Endpoints in the Internet of Things Malware., , , , , и . CoRR, (2019)Cyberattacks and Security of Cloud Computing: A Complete Guideline., , , , , и . Symmetry, 15 (11): 1981 (ноября 2023)Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , и . Comput. Networks, (2021)Domain Name System Security and Privacy: A Contemporary Survey., , , , и . CoRR, (2020)LACP-SG: Lightweight Authentication Protocol for Smart Grids., и . Sensors, 23 (4): 2309 (февраля 2023)QOI: Assessing Participation in Threat Information Sharing., , , , , , и . ICASSP, стр. 6951-6955. IEEE, (2018)Graph-Based Comparison of IoT and Android Malware., , , , , и . CSoNet, том 11280 из Lecture Notes in Computer Science, стр. 259-272. Springer, (2018)Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach., , , , , , , , и . IEEE Internet of Things Journal, 6 (5): 8977-8988 (2019)Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , и . CoRR, (2021)CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things., , , , и . Internet Things, (октября 2023)