From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Technology Perspective: Is Green IT a Threat to IT Security?, , и . ISDF, том 41 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 147-154. Springer, (2009)Decision tree-based detection of denial of service and command injection attacks on robotic vehicles., , , и . WIFS, стр. 1-6. IEEE, (2015)Have You Been Framed and Can You Prove It?, , , и . MIPRO, стр. 1236-1241. IEEE, (2021)Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 365-372. IEEE Computer Society, (2017)Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack., , , и . MIPRO, стр. 1258-1263. IEEE, (2023)Behaviour-Based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle., , , и . IUCC-CSS, стр. 61-68. IEEE Computer Society, (2016)A countermeasure mechanism for fast scanning malware., , и . Cyber Security And Protection Of Digital Services, стр. 1-8. IEEE, (2016)You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks., , и . IEEE Access, (2016)Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware., , и . Int. J. Grid Util. Comput., 13 (5): 495-504 (2022)Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle., , и . CIT/IUCC/DASC/PICom, стр. 2106-2113. IEEE, (2015)