From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Burn Before Reading: A stealthy framework for combating live forensics examinations., , , и . eCrime, стр. 1-10. IEEE, (2009)An abstraction layer for controlling heterogeneous mobile cyber-physical systems., и . CASE, стр. 117-121. IEEE, (2013)BEXPLORER: Computer and Communication Control Using EEG., , , , , и . HCI (2), том 5611 из Lecture Notes in Computer Science, стр. 579-587. Springer, (2009)Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks., , , и . ICN, стр. 445-450. IEEE Computer Society, (2009)HELP: // Hypertext In-Emergency Leveraging Protocol., и . ICC, стр. 1-5. IEEE, (2009)Prime-based mimic functions for the implementation of covert channels., , и . WCNIS, стр. 538-543. IEEE, (2010)Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs., , , и . MASS, стр. 342-350. IEEE Computer Society, (2013)Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew., и . GLOBECOM, стр. 1-6. IEEE, (2009)SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms., , и . GLOBECOM, стр. 1-5. IEEE, (2010)A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks., , , и . INDIN, стр. 15-22. IEEE, (2018)