From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks., , , , и . Bell Labs Tech. J., 17 (3): 61-78 (2012)Elementary Risks: Bridging Operational and Strategic Security Realms., , и . SITIS, стр. 278-286. IEEE Computer Society, (2015)Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks., , , , , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 524-529. Springer, (2014)Software-Defined LANs for Interconnected Smart Environment., , , , , , , , , и . ITC, стр. 219-227. IEEE, (2015)On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks., , , , , и . ESORICS (2), том 9327 из Lecture Notes in Computer Science, стр. 642-661. Springer, (2015)Secure Application-Oriented Network Micro-Slicing., , , , и . NetSoft, стр. 248-250. IEEE, (2019)Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers., , , и . DRCN, стр. 1-6. IEEE, (2020)STewARD: SDN and blockchain-based Trust evaluation for Automated Risk management on IoT Devices., , , , и . INFOCOM Workshops, стр. 841-846. IEEE, (2019)Detecting Fake Base Stations Using Knowledge Graphs and ML-Based Techniques., , , , и . VCC, стр. 37-42. IEEE, (2023)