From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure true random number generator in WLAN/LAN., , , и . SIN, стр. 331-335. ACM, (2013)Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)., , , и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 539-548. Springer, (2017)A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices., , , , , и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 860-876. Springer, (2017)Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud., , и . TrustCom, стр. 1276-1284. IEEE, (2020)Comprehensive Security Assessment of Combined MTD Techniques for the Cloud., , , и . MTD@CCS, стр. 11-20. ACM, (2018)Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors., , , и . IEEE Access, (2020)An Automated Security Analysis Framework and Implementation for Cloud., , , , и . CoRR, (2019)Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing., , и . TrustCom/BigDataSE, стр. 573-578. IEEE, (2018)An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud., , , , и . ICISC, том 11975 из Lecture Notes in Computer Science, стр. 150-164. Springer, (2019)Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation., , , , , , и . Comput. Secur., (ноября 2023)