From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education., , и . EDUCON, стр. 1-5. IEEE, (2023)Privacy Challenges With Protecting Live Vehicular Location Context., , , , и . IEEE Access, (2020)Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.. University of Warwick, Coventry, UK, (2018)British Library, EThOS.Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , и . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Throughput Aware Authentication Prioritisation for Vehicular Communication Networks., , , и . VTC Fall, стр. 1-5. IEEE, (2019)ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , и . CoRR, (2022)Trust Trackers for Computation Offloading in Edge-Based IoT Networks., , и . INFOCOM, стр. 1-10. IEEE, (2021)Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation., , и . EDCC, стр. 111-118. IEEE, (2019)The impact of decreasing transmit power levels on FlockLab to achieve a sparse network., , и . Bench@CPSIoTWeek, стр. 7-12. ACM, (2019)Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud., , , и . CCS, стр. 3415-3417. ACM, (2022)