From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the impact of empirical attack models targeting marine transportation., , и . MT-ITS, стр. 200-205. IEEE, (2017)A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems., , , , , и . IEEE Access, (2019)On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts., , , и . ARES, стр. 22:1-22:10. ACM, (2017)IoT Threat Detection Testbed Using Generative Adversarial Networks., , , , , и . CoRR, (2023)An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph., , , , и . EuroS&P, стр. 144-159. IEEE, (2023)Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations., , , , , , и . WiMob, стр. 206-211. IEEE, (2023)A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups., , , , и . IEEE Trans. Ind. Informatics, 16 (4): 2687-2697 (2020)Revisiting IoT Fingerprinting behind a NAT., и . ISPA/BDCloud/SocialCom/SustainCom, стр. 1745-1752. IEEE, (2021)Exploiting Ransomware Paranoia For Execution Prevention., , , и . ICC, стр. 1-6. IEEE, (2020)Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict., , , и . ICC Workshops, стр. 896-901. IEEE, (2024)