From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Architectural Design Decisions for Achieving Reliable Software Systems., и . ISARCS, том 6150 из Lecture Notes in Computer Science, стр. 19-32. Springer, (2010)WPA3 Connection Deprivation Attacks., и . CRiSIS, том 12026 из Lecture Notes in Computer Science, стр. 164-176. Springer, (2019)Secure Method Calls by Instrumenting Bytecode with Aspects., и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 126-141. Springer, (2009)Collaboration through computation: incorporating trust model into service-based software systems., , и . Serv. Oriented Comput. Appl., 3 (1): 47-63 (2009)Trustworthiness testing of phishing websites: A behavior model-based approach., и . Future Gener. Comput. Syst., 28 (8): 1258-1271 (2012)Security Vulnerability Metrics for Connected Vehicles., и . QRS Companion, стр. 17-23. IEEE, (2019)Mining Attribute-Based Access Control Policies., и . ICISS, том 13784 из Lecture Notes in Computer Science, стр. 186-201. Springer, (2022)Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3., , и . FPS, том 13291 из Lecture Notes in Computer Science, стр. 235-252. Springer, (2021)A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments., , , и . DSC, стр. 1-8. IEEE, (2022)UMLintr: A UML Profile for Specifying Intrusions., и . ECBS, стр. 279-288. IEEE Computer Society, (2006)