From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems., , , , , , и . CCS, стр. 279-291. ACM, (2020)Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies., , , и . SACMAT, стр. 131-144. ACM, (2020)EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems., , , и . SmartGridComm, стр. 1-6. IEEE, (2018)No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones., , и . MobiHoc, стр. 522-527. ACM, (2023)Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies., , , , и . SACMAT, стр. 195-206. ACM, (2019)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , и . MSCPES@CPSIoTWeek, стр. 1-6. IEEE, (2019)The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS., , , и . CHASE, стр. 94-99. ACM / IEEE, (2018)Random Test Data Generation for Java Classes Annotated with JML Specifications., и . Software Engineering Research and Practice, стр. 385-391. CSREA Press, (2007)SoK: Security of Programmable Logic Controllers., , , , и . CoRR, (2024)DyPolDroid: Protecting Against Permission-Abuse Attacks in Android., , , , , , и . Inf. Syst. Frontiers, 25 (2): 529-548 (апреля 2023)