From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intersection Approach to Vulnerability Handling., , , и . WEBIST (1), стр. 171-174. INSTICC Press, (2010)Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems., , , , и . Critical Infrastructure Protection, том 441 из IFIP Advances in Information and Communication Technology, стр. 213-229. Springer, (2014)Security issues of a phasor data concentrator for smart grid infrastructure., , , и . EWDC, стр. 3-8. ACM, (2011)Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks., , , и . 3PGCIC, стр. 247-254. IEEE, (2013)Resource allocation in multi-domain networks based on service level specifications., , , , и . J. Commun. Networks, 8 (1): 106-115 (2006)Design principles and algorithms for effective high-speed IP flow monitoring., , , и . Comput. Commun., 29 (10): 1653-1664 (2006)Assessing the scalability of component-based frameworks: the CADENUS case study., , , и . SIGMETRICS Perform. Evaluation Rev., 32 (3): 34-43 (2004)A comparative analysis of emerging approaches for securing java software with Intel SGX., , , и . Future Gener. Comput. Syst., (2019)A Practical and Scalable Privacy-preserving Framework., , , , , , , , , и 1 other автор(ы). CSR, стр. 598-603. IEEE, (2023)On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project., , , , и . CRiSIS, стр. 94-99. IEEE Computer Society, (2011)