From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on Wireless Sensors Networks Security Based on a Layered Approach., , , и . WWIC, том 9071 из Lecture Notes in Computer Science, стр. 77-93. Springer, (2015)A deep learning anomaly detection framework with explainability and robustness., , , , , и . ARES, стр. 134:1-134:7. ACM, (2023)Cybersecurity, Monitoring, Explainability and Resilience., и . ICMU, стр. 1-7. IEEE, (2023)5G SUCI Catcher: Attack and Detection., , , , , , и . CloudCom, стр. 285-290. IEEE, (2023)A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks., , , , , и . IEEE Access, (2023)Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion., , , , и . ICSOFT, стр. 154-165. SciTePress, (2018)Testing techniques to assess impact and cascading effects., , , и . CloudCom, стр. 269-272. IEEE, (2023)Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System., , , , , и . ICST Workshops, стр. 40-48. IEEE, (2022)A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)., , , и . FPS, том 11358 из Lecture Notes in Computer Science, стр. 257-264. Springer, (2018)Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection., , , , и . ICSOFT, стр. 510-517. SCITEPRESS, (2023)