From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior*., , , , и . IECON, стр. 1-6. IEEE, (2022)Automatic Detection of Attacks on Cryptographic Protocols: A Case Study., , , и . DIMVA, том 3548 из Lecture Notes in Computer Science, стр. 69-84. Springer, (2005)A software implementation of IEEE 1588 on RTAI/RTnet platforms., , , , , и . ETFA, стр. 1-8. IEEE, (2010)Error detection and management in CAN XR., , , и . WFCS, стр. 1-9. IEEE, (2018)CAN With eXtensible In-Frame Reply: Protocol Definition and Prototype Implementation., , , и . IEEE Trans. Ind. Informatics, 13 (5): 2436-2446 (2017)A twofold model for the analysis of access control policies in industrial networked systems., , , и . Comput. Stand. Interfaces, (2015)Virtual machines for distributed real-time systems., и . Comput. Stand. Interfaces, 31 (1): 30-39 (2009)A socket interface for CAN devices., , и . Comput. Stand. Interfaces, 29 (6): 662-673 (2007)A High-performance CAN-like Arbitration Scheme for EtherCAT., , , и . ETFA, стр. 1-8. IEEE, (2009)Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols., , , , и . DepCoS-RELCOMEX, стр. 153-160. IEEE Computer Society, (2007)