From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Method Calls by Instrumenting Bytecode with Aspects., и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 126-141. Springer, (2009)A Classification of Intrusion Detection Systems in the Cloud., и . J. Inf. Process., 23 (4): 392-401 (2015)A classification of attacks to In-Vehicle Components (IVCs)., , , и . Veh. Commun., (2020)Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game., , , и . IEEE Trans. Reliab., 70 (3): 970-985 (2021)RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware., и . Comput. Networks, (2021)Collaboration through computation: incorporating trust model into service-based software systems., , и . Serv. Oriented Comput. Appl., 3 (1): 47-63 (2009)Vehicle Software Engineering (VSE): Research and Practice., , и . IEEE Internet Things J., 7 (10): 10137-10149 (2020)AIM: An Android Interpretable Malware detector based on application class modeling., , и . J. Inf. Secur. Appl., (июня 2023)TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks., , и . RSSRail, том 14198 из Lecture Notes in Computer Science, стр. 22-39. Springer, (2023)Security Vulnerability Metrics for Connected Vehicles., и . QRS Companion, стр. 17-23. IEEE, (2019)