From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart grid data integrity attacks: characterizations and countermeasuresπ., , , , , и . SmartGridComm, стр. 232-237. IEEE, (2011)Measuring the attack surfaces of two FTP daemons., , , и . QoP, стр. 3-10. ACM, (2006)Are Vulnerability Disclosure Deadlines Justified?, , и . Metrisec@ESEM, стр. 96-101. IEEE, (2011)Vulnerability identification and classification via text mining bug databases., , и . IECON, стр. 3612-3618. IEEE, (2014)Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms., , , и . ISIE, стр. 2035-2041. IEEE, (2014)Information gain based dimensionality selection for classifying text documents., , и . IEEE Congress on Evolutionary Computation, стр. 440-445. IEEE, (2013)Analyses of Two End-User Software Vulnerability Exposure Metrics., , и . ARES, стр. 1-10. IEEE Computer Society, (2012)Mining Bug Databases for Unidentified Software Vulnerabilities., , , и . HSI, стр. 89-96. IEEE, (2012)Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements., , и . CRITIS, том 7722 из Lecture Notes in Computer Science, стр. 46-58. Springer, (2012)Multi-criteria based staging of Optimal PMU Placement using Fuzzy Weighted Average., , , и . ISIE, стр. 1-8. IEEE, (2013)