From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Protocol for Anonymous and Accurate E-Polling., , и . TCGOV, том 3416 из Lecture Notes in Computer Science, стр. 112-121. Springer, (2005)A privacy enforcing framework for Android applications., , , и . Comput. Secur., (2016)Integrating cyber attacks within fault trees., , и . Reliab. Eng. Syst. Saf., 94 (9): 1394-1402 (2009)Through the Description of Attacks: A Multidimensional View., и . SAFECOMP, том 4166 из Lecture Notes in Computer Science, стр. 15-28. Springer, (2006)The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 152-163. Springer, (2011)Scada Malware, a Proof of Concept., , , и . CRITIS, том 5508 из Lecture Notes in Computer Science, стр. 211-222. Springer, (2008)Blockchain for Transport (BC4 T), Performance Simulations of Blockchain Network for Emission Monitoring., , , , и . KST, стр. 1-6. IEEE, (2022)An experimental investigation of malware attacks on SCADA systems., , , и . Int. J. Crit. Infrastructure Prot., 2 (4): 139-145 (2009)Simulating malware with MAlSim., , и . J. Comput. Virol., 6 (1): 65-75 (2010)A Service-Oriented Approach for Assessing Infrastructure Security., и . Critical Infrastructure Protection, том 253 из IFIP, стр. 367-379. Springer, (2007)