From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Development of information fusion model for layered sensing systems using computing with words., , , и . CogSIMA, стр. 183-188. IEEE, (2011)ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things., , , , , и . IEEE Access, (2022)Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility., , и . IEEE Trans. Intell. Transp. Syst., 25 (1): 452-461 (января 2024)Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure., , , , и . GLOBECOM, стр. 1-7. IEEE, (2019)Security Analysis of Multiple SDN Controllers Based on Stochastic Petri Nets., , и . SpringSim, стр. 1-12. IEEE, (2019)Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk., , , и . MILCOM, стр. 1-8. IEEE, (2019)Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights., , , и . ISI, стр. 25-30. IEEE, (2018)Towards Secure and Smart Healthcare in Smart Cities Using Blockchain., , , и . ISC2, стр. 1-4. IEEE, (2018)Assessing network path vulnerabilities for secure cloud computing., , и . ICC, стр. 5548-5552. IEEE, (2012)Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix., , , и . ICNC, стр. 181-187. IEEE, (2023)