From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey on forensic event reconstruction systems., , и . Int. J. Inf. Comput. Secur., 9 (4): 337-360 (2017)Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients., , и . CNS, стр. 175-183. IEEE, (2014)Accurate Manipulation of Delay-based Internet Geolocation., , и . AsiaCCS, стр. 887-898. ACM, (2017)UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband., , , и . USENIX Security Symposium, стр. 73-88. USENIX Association, (2019)Position Paper: Certificate Root Stores - An Area of Unity or Disparity?, , и . CSET @ USENIX Security Symposium, стр. 105-110. ACM, (2022)3D Printed Dry Electrodes for Single-Lead Newborn ECG Monitoring., , и . CinC, стр. 1-4. IEEE, (2023)Internet Location Verification: Challenges and Solutions.. CoRR, (2018)ECG Dry-electrode 3D Printing and Signal Quality Considerations., и . EMBC, стр. 6855-6858. IEEE, (2021)What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks., , и . PASSWORDS, том 9551 из Lecture Notes in Computer Science, стр. 72-91. Springer, (2015)Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes., , и . CoRR, (2017)