From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A software implementation of IEEE 1588 on RTAI/RTnet platforms., , , , , и . ETFA, стр. 1-8. IEEE, (2010)Real-Time Embedded Operating Systems.. Embedded Systems Handbook, CRC Press, (2005)A twofold model for the analysis of access control policies in industrial networked systems., , , и . Comput. Stand. Interfaces, (2015)Detecting Chains of Vulnerabilities in Industrial Networks., , , , , , и . IEEE Trans. Ind. Informatics, 5 (2): 181-193 (2009)Error detection and management in CAN XR., , , и . WFCS, стр. 1-9. IEEE, (2018)Automatic Detection of Attacks on Cryptographic Protocols: A Case Study., , , и . DIMVA, том 3548 из Lecture Notes in Computer Science, стр. 69-84. Springer, (2005)Seamless integration of CAN in intranets., , , и . Comput. Stand. Interfaces, (2016)CAN With eXtensible In-Frame Reply: Protocol Definition and Prototype Implementation., , , и . IEEE Trans. Ind. Informatics, 13 (5): 2436-2446 (2017)Event Notification in CAN-Based Sensor Networks., , , , , и . IEEE Trans. Ind. Informatics, 15 (10): 5613-5625 (2019)Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior*., , , , и . IECON, стр. 1-6. IEEE, (2022)