From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Botnet Attack Detection at the IoT Edge Based on Sparse Representation., , и . GIoTS, стр. 1-6. IEEE, (2019)Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures., , и . CAMAD, стр. 1-6. IEEE, (2020)On Architectural Support for Instruction Set Randomization., , , , и . ACM Trans. Archit. Code Optim., 17 (4): 36:1-36:26 (2020)CORONA: A Coordinate and Routing system for Nanonetworks., , , и . NANOCOM, стр. 18:1-18:6. ACM, (2015)Demo: Detecting Third-Party Library Problems with Combined Program Analysis., , и . CCS, стр. 2429-2431. ACM, (2021)Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain., , , , , , , , , и . CSR, стр. 464-469. IEEE, (2023)Security Applications of GPUs.. ENASE, стр. 5. SciTePress, (2019)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime., , , , , , , и . REFSQ Workshops, том 1342 из CEUR Workshop Proceedings, стр. 142-147. CEUR-WS.org, (2015)Incident Handling for Healthcare Organizations and Supply-Chains., , , , , , , , и . ISCC, стр. 1-7. IEEE, (2022)