From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems., , , , и . ICISSP, стр. 727-738. SciTePress, (2019)Tax Avoidance and Social Control., , и . OR, стр. 633-639. Springer, (2019)The Toyota Way Fieldbook, и . (2005)On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO., и . ICISSP, стр. 683-693. SciTePress, (2017)On the Reliability of Automated Analysis of Fracture Surfaces Using a Novel Computer Vision-Based Tool, , , , , , , и . Advanced Engineering Materials, 25 (21): 2300876 (2023)AI - Based On The Fly Design of Experiments in Physics and Engineering., , , , , , , и . ACSOS-C, стр. 150-153. IEEE, (2021)Reconstruction of incomplete X-ray diffraction pole figures of oligocrystalline materials using deep learning, , , , , , и . Scientific Reports 2023 13:1, 13 (1): 1-12 (апреля 2023)Detecting and preventing replay attacks in industrial automation networks operated with profinet IO., и . J. Comput. Virol. Hacking Tech., 14 (4): 253-268 (2018)Artificial intelligence for online characterization of ultrashort X-ray free-electron laser pulses, , , , , , , , , и 4 other автор(ы). Scientific Reports, 12 (1): 17809-- (2022)How did you get here? PHY-layer path signatures., , и . WoWMoM, стр. 1-3. IEEE Computer Society, (2014)