From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PUF-based Smart Tags for Supply Chain Management., , , , и . ARES, стр. 41:1-41:7. ACM, (2021)Strategic Security Resource Allocation for Internet of Things., , , и . ICDCS, стр. 737-738. IEEE Computer Society, (2016)The AC-Index: Fast Online Detection of Correlated Alerts., , и . STM, том 9331 из Lecture Notes in Computer Science, стр. 107-122. Springer, (2015)Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC., , , , и . SmartIoT, стр. 229-236. IEEE, (2021)Hypergraph-Based Attack Models for Network Intrusion Detection., , , и . SEBD, стр. 61-68. (2014)Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques., , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 905-910. IEEE, (2023)Intrusion Detection with Hypergraph-Based Attack Models., , , и . GKR, том 8323 из Lecture Notes in Computer Science, стр. 58-73. Springer, (2013)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework., , , , , , и . BCCA, стр. 28-35. IEEE, (2023)Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review., , и . PADG@ESORICS, том 11550 из Lecture Notes in Computer Science, стр. 202-226. Springer, (2018)Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios., , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 419-436. Springer, (2017)