From post

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.

, , , , , , , и . ESORICS (2), том 14345 из Lecture Notes in Computer Science, стр. 123-144. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Formal Approach for the Forensic Analysis of Logs., , и . SoMeT, том 147 из Frontiers in Artificial Intelligence and Applications, стр. 159-176. IOS Press, (2006)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , и . Technique et Science Informatiques, 28 (5): 611-644 (2009)Security hardening of open source software., , и . PST, том 380 из ACM International Conference Proceeding Series, стр. 43. ACM, (2006)Delay aware measurements gathering in WAMS communication network., , , , и . GlobalSIP, стр. 1090-1094. IEEE, (2017)A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL., , и . QSIC, стр. 348-355. IEEE Computer Society, (2007)QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud., , , , , , и . CloudCom, стр. 163-170. IEEE Computer Society, (2018)PetaDroid: Adaptive Android Malware Detection Using Deep Learning., и . DIMVA, том 12756 из Lecture Notes in Computer Science, стр. 319-340. Springer, (2021)Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective., , , , , и . DSN, стр. 562-573. IEEE Computer Society, (2018)Forensic analysis of logs: Modeling and verification., , , и . Knowl. Based Syst., 20 (7): 671-682 (2007)The multi-depot split-delivery vehicle routing problem: Model and solution algorithm., , , и . Knowl. Based Syst., (2014)