From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proof-Based Method for Modelling Timed Systems., и . Ershov Memorial Conference, том 8974 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2014)Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study., , , и . DSN Workshops, стр. 36-43. IEEE Computer Society, (2017)Reasoning about XACML policies using CSP.. SWS, стр. 28-35. ACM, (2005)Dimensions of dynamic coalitions, , , , , , , и . (2006)Informing decision makers: facilitating communication and trust for decision makers during crises., , , , и . ISCRAM, ISCRAM Association, (2018)Specification and Analysis of Automata-Based Designs., , , и . IFM, том 1945 из Lecture Notes in Computer Science, стр. 176-193. Springer, (2000)Stochastic Specification and Verification., и . IWFM, BCS, (1999)A formal framework for security testing of automotive over-the-air update systems., , , , и . J. Log. Algebraic Methods Program., (2023)Access control and view generation for provenance graphs., , , и . Future Gener. Comput. Syst., (2015)Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows., , , и . DSN Workshops, стр. 231-238. IEEE Computer Society, (2018)