From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Real-Time SCADA Attack Detection by Means of Formal Methods., , и . WETICE, стр. 231-236. IEEE, (2019)Privacy-Preserving Energy-Reading for Smart Meter., и . ICOST, том 9102 из Lecture Notes in Computer Science, стр. 165-177. Springer, (2015)Keystroke Analysis for User Identification using Deep Neural Networks., , , и . IJCNN, стр. 1-8. IEEE, (2019)Privacy-Preserving LDA Classification over Horizontally Distributed Data., , , и . IDC, том 868 из Studies in Computational Intelligence, стр. 65-74. Springer, (2019)A model for usage control in GRID systems.. SecureComm, стр. 520. IEEE, (2007)A model for usage control in GRID systems., и . SecureComm, стр. 169-175. IEEE, (2007)Distributed Data Anonymization., и . DASC/PiCom/DataCom/CyberSciTech, стр. 580-586. IEEE, (2019)Classification of ransomware families with machine learning based on N-gram of opcodes., , , , , и . Future Gener. Comput. Syst., (2019)Dependability in dynamic, evolving and heterogeneous systems: the connect approach., , , , и . SERENE, стр. 83-88. ACM, (2010)Handling Meta Attribute Information in Usage Control Policies (Short Paper)., , , , , , и . ETAA, том 13136 из Lecture Notes in Computer Science, стр. 143-151. Springer, (2021)