From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation., , , , , , , , , и 1 other автор(ы). NDSS, The Internet Society, (2021)Digital Twin of Cyber-Physical CNC for Smart Manufacturing., , , , и . DTPI, стр. 1-6. IEEE, (2023)A Consensus-based Approach for Distributed Quickest Detection of Significant Events in Networks., , , , и . ACSSC, стр. 1881-1884. IEEE, (2019)ct-fuzz: Fuzzing for Timing Leaks., , и . CoRR, (2019)Low-Leakage Secure Search for Boolean Expressions., , , и . CT-RSA, том 10159 из Lecture Notes in Computer Science, стр. 397-413. Springer, (2017)Scratch that! An Evolution-based Adversarial Attack against Neural Networks., , , и . CoRR, (2019)On Uncertainty and Robustness in Large-Scale Intelligent Data Fusion Systems., , , , , , , , , и 4 other автор(ы). CogMI, стр. 82-91. IEEE, (2020)IoTHound: environment-agnostic device identification and monitoring., , , , , , и . IOT, стр. 7:1-7:9. ACM, (2020)Delay Tolerant Networks for Industry 4.0., , , и . SoSE, стр. 1-8. IEEE, (2023)Application of Trust Assessment Techniques to IoBT Systems., , , , , , и . MILCOM, стр. 833-840. IEEE, (2019)