From post

A Methodology for Cybersecurity Risk Assessment in Supply Chains.

, , , и . ESORICS Workshops (2), том 14399 из Lecture Notes in Computer Science, стр. 26-41. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments., , , , , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 146-155. CEUR-WS.org, (2017)Android malware family classification based on resource consumption over time., , , , , и . MALWARE, стр. 31-38. IEEE Computer Society, (2017)Assessing data availability of Cassandra in the presence of non-accurate membership., , , и . DISCCO@SRDS, стр. 2:1-2:6. ACM, (2013)Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF., , , , , и . Int. J. Inf. Sec., 20 (3): 445-460 (2021)A lightweight approach to the concurrent use and integration of SysML and formal methods in systems design., , , , , , и . MoDELS (Companion), стр. 83-84. ACM, (2022)Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches., , и . CODASPY, стр. 95-106. ACM, (2017)The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics., , , , и . VizSEC, стр. 1-8. IEEE Computer Society, (2017)Designing Exception Handling Using Event-B., , , , , , и . ABZ, том 14759 из Lecture Notes in Computer Science, стр. 270-277. Springer, (2024)Malware family identification with BIRCH clustering., , , , и . ICCST, стр. 1-6. IEEE, (2017)Adaptive online scheduling in storm., , и . DEBS, стр. 207-218. ACM, (2013)