From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Different Approaches to Protocol and Service Testing.. IWTCS, том 147 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (1999)A modal based verification for LOTOS., и . FORTE, том 6 из IFIP Conference Proceedings, стр. 215-217. Chapman & Hall, (1994)An Analysis of Secure M2M Communication in WSNs Using DTLS., , и . ICDCS Workshops, стр. 78-83. IEEE Computer Society, (2016)A Study of Threat Detection Systems and Techniques in the Cloud., , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2017)TestNet: Let's Test Together!., , и . TestCom, том 2644 из Lecture Notes in Computer Science, стр. 258-264. Springer, (2003)Smart Measurements and Analysis for Software Quality Enhancement., , , и . ICSOFT (Selected Papers), том 1077 из Communications in Computer and Information Science, стр. 194-219. Springer, (2018)Special issue on formal active and passive testing of distributed and networked systems., , и . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., и . SEKE, стр. 393-396. Knowledge Systems Institute Graduate School, (2014)Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection., , , , и . ICWS, том 10966 из Lecture Notes in Computer Science, стр. 472-486. Springer, (2018)HTTP/2 Attacks Generation using 5Greplay., , , , и . ARES, стр. 138:1-138:7. ACM, (2023)