From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Employment of Secure Enclaves in Cheat Detection Hardening., , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 48-62. Springer, (2020)Towards a Modular On-Premise Approach for Data Sharing., , , , и . Sensors, 21 (17): 5805 (2021)IoT security certifications: Challenges and potential approaches., , , и . Comput. Secur., (2022)Secure Provisioning for Achieving End-to-End Secure Communications., , , и . ADHOC-NOW, том 11803 из Lecture Notes in Computer Science, стр. 498-507. Springer, (2019)A Survey on Using Kolmogorov Complexity in Cybersecurity., , и . Entropy, 21 (12): 1196 (2019)Online Influence Forest for Streaming Anomaly Detection., , и . IDA, том 13876 из Lecture Notes in Computer Science, стр. 274-286. Springer, (2023)pTASC: trustable autonomous secure communications., , , , и . ICDCN, стр. 193-202. ACM, (2019)Enforcing Privacy and Security in Public Cloud Storage., , и . PST, стр. 1-5. IEEE Computer Society, (2018)Digital Signatures Workflows in Alfresco., , , , и . EGOVIS, том 9831 из Lecture Notes in Computer Science, стр. 304-318. Springer, (2016)Host-based IDS: A review and open issues of an anomaly detection system in IoT., , , , , и . Future Gener. Comput. Syst., (2022)