From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linking Contexts from Distinct Data Sources in Zero Trust Federation., , и . ETAA, том 13782 из Lecture Notes in Computer Science, стр. 136-144. Springer, (2022)Acila: attaching identities of workloads for efficient packet classification in a cloud data center network., , , , и . FIRA@SIGCOMM, стр. 79-85. ACM, (2022)Message from the IWFIT 2018 Workshop Organizers., , и . COMPSAC (2), стр. 762. IEEE Computer Society, (2018)978-1-5386-2667-2.Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet., , и . COMPSAC (2), стр. 658-663. IEEE Computer Society, (2018)978-1-5386-2667-2.Mutual Secrecy of Attributes and Authorization Policies in Identity Federation., и . COMPSAC, стр. 1202-1209. IEEE, (2021)A tight bound on online buffer management for two-port shared-memory switches., , и . SPAA, стр. 358-364. ACM, (2007)Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning., , , и . ICOIN, стр. 584-589. IEEE, (2020)Design and Implementation of a Web-Based Internet Broadcasting System on QoS Multicast Routers., , , , и . ASIAN, том 2550 из Lecture Notes in Computer Science, стр. 195-205. Springer, (2002)Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes., , , , , , и . COMPSAC (2), стр. 471-476. IEEE, (2019)Centralized Control of Account Migration at Single Sign-On in Shibboleth., и . J. Inf. Process., (2021)