From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Configurable Vulnerability Assessment in the Cloud., , , и . CAMAD, стр. 1-6. IEEE, (2019)Sub-operating systems: a new approach to application security., , и . ACM SIGOPS European Workshop, стр. 108-115. ACM, (2002)Cyber-Ranges as a Mean of Security Culture Establishment., , и . ERCIM News, (2020)Scheduling of multiple network packet processing applications using Pythia., , , и . Comput. Networks, (2022)Design and Implementation of a Stateful Network Packet Processing Framework for GPUs., , , и . IEEE/ACM Trans. Netw., 25 (1): 610-623 (2017)Two-factor authentication: is the world ready?: quantifying 2FA adoption., , , и . EUROSEC, стр. 4:1-4:7. ACM, (2015)A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties., , , , , , и . MSTEC, том 12512 из Lecture Notes in Computer Science, стр. 143-156. Springer, (2020)Regular Expression Matching on Graphics Hardware for Intrusion Detection., , , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 265-283. Springer, (2009)GRIM: Leveraging GPUs for Kernel Integrity Monitoring., , , и . RAID, том 9854 из Lecture Notes in Computer Science, стр. 3-23. Springer, (2016)Design and Implementation of Virtual Private Services., , , , и . WETICE, стр. 269-274. IEEE Computer Society, (2003)