From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Revised Attack Taxonomy for a New Generation of Smart Attacks., , и . Computer and Information Science, 7 (3): 18-30 (2014)Service Management Platform: The Next Step in Management Tools.. DSOM, том 1960 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2000)Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)Veranstaltung zum Tagungsmotto: Sicherheit.. GI Jahrestagung (2), том P-134 из LNI, стр. 992-993. GI, (2008)A User-Centric Approach to Automated Service Provisioning., и . Integrated Network Management, стр. 273-276. IEEE, (2001)Disequilibrium: Tor's Exit Node Selection under the Stereoscope., , и . TrustCom/BigDataSE/ISPA (1), стр. 942-949. IEEE, (2015)Towards an Accounting System for Multi-Provider Grid Environments., , , и . Integrated Network Management, стр. 60-69. IEEE, (2007)Content Driven Profile Matching across Online Social Networks., , и . ASONAM, стр. 1049-1055. ACM, (2017)Towards an Adaptive and Effective IDS Using OpenFlow., и . AIMS, том 9122 из Lecture Notes in Computer Science, стр. 134-139. Springer, (2015)CeTUP: Controller-equipped Topology Update Process for Tactical Ad-hoc Networks., и . PE-WASUN, стр. 57-66. ACM, (2020)