From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems, и . CoRR, (2013)Please Permit Me: Stateless Delegated Authorization in Mashups, , , , и . Proceedings of the 2008 Annual Computer Security Applications Conference, Anaheim, California, IEEE Computer Society Press, (декабря 2008)Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities., , и . LREC, стр. 1355-1358. European Language Resources Association (ELRA), (2014)Secure Provenance: Protecting theGenealogy of Bits., , и . login Usenix Mag., (2009)MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2., , и . IEEE CLOUD, стр. 487-493. IEEE Computer Society, (2012)A component-based framework for radio-astronomical imaging software systems., , и . Softw. Pract. Exp., 38 (5): 493-507 (2008)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., и . 5GWF, стр. 383-387. IEEE, (2021)Exposing Adaptive Cruise Control in Advanced Driving Assistance Systems., и . WF-IoT, стр. 1-6. IEEE, (2022)Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies., и . WF-IoT, стр. 1-6. IEEE, (2022)An Interaction Provenance-based Trust Management Scheme For Connected Vehicles., и . CCNC, стр. 731-732. IEEE, (2022)