From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A plan-based mission control center for autonomous vehicles., и . IUI, стр. 277-279. ACM, (2004)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , и . IEEE Access, (2018)AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , и . AI Magazine, 28 (3): 73-91 (2007)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , и 4 other автор(ы). CoRR, (2021)Supporting and Optimizing Full Unification in a Forward Chaining Rule System.. AAAI, стр. 710-715. AAAI Press / The MIT Press, (1993)Preventing Kernel Hacks with HAKCs., , , , , , и . NDSS, The Internet Society, (2022)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , и . Mobile HCI, том 3160 из Lecture Notes in Computer Science, стр. 466-470. Springer, (2004)Active Trust Management for Autonomous Adaptive Survivable Systems., и . IWSAS, том 1936 из Lecture Notes in Computer Science, стр. 40-49. Springer, (2000)Introduction: The First International Workshop on Self-Adaptive Software., , и . IWSAS, том 1936 из Lecture Notes in Computer Science, стр. 1-10. Springer, (2000)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , и . ACM Conference on Computer and Communications Security, стр. 901-913. ACM, (2015)