From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Detection of Side-Channel Attacks., и . PRDC, стр. 185-186. IEEE, (2018)User-Centric Security Assessment of Software Configurations: A Case Study., , , и . ESSoS, том 8364 из Lecture Notes in Computer Science, стр. 196-212. Springer, (2014)Gyro: A Modular Scale-Out Layer for Single-Server DBMSs., , и . SRDS, стр. 71-82. IEEE, (2019)BDG-torus union graph-an efficient algorithmically specializedparallel interconnect., , и . SPDP, стр. 407-414. IEEE Computer Society, (1991)Designing High-Performance & Reliable Superscalar Architectures: The out of Order Reliable Superscalar (O3RS) Approach., и . DSN, стр. 473-481. IEEE Computer Society, (2000)Practical Aspects of IP Take-Over Mechanisms., и . WORDS Fall, стр. 250-254. IEEE Computer Society, (2003)A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking., , , , и . IEEE Trans. Parallel Distributed Syst., 26 (10): 2630-2642 (2015)Inferring Performance Bug Patterns from Developer Commits., , и . ISSRE, стр. 70-81. IEEE, (2019)An empirical study of reflection attacks using NetFlow data., и . Cybersecur., 7 (1): 13 (декабря 2024)On the Use of Formal Techniques for Validation., и . FTCS, стр. 390-399. IEEE Computer Society, (1998)