From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of Smart Grid Data Collection Technologies., , , и . SAFECOMP, том 6894 из Lecture Notes in Computer Science, стр. 143-156. Springer, (2011)A healthcare real-time monitoring system for multiple sensors data collection and correlation., , , и . KES IIMSS, том 226 из Studies in Computational Intelligence, стр. 455-464. Springer, (2009)An Analysis of OpenStack Vulnerabilities., , , и . EDCC, стр. 129-134. IEEE Computer Society, (2017)From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach., , , и . SEUS, том 5860 из Lecture Notes in Computer Science, стр. 192-202. Springer, (2009)Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study., , и . ISSRE, стр. 289-298. IEEE Computer Society, (2010)A Field Perspective on the Interoperability of Web Services., , и . IEEE SCC, стр. 75-82. IEEE Computer Society, (2014)Understanding Interoperability Issues of Web Service Frameworks., , и . DSN, стр. 323-330. IEEE Computer Society, (2014)Test-Based Interoperability Certification for Web Services., , и . DSN, стр. 196-206. IEEE Computer Society, (2015)ITWS: An Extensible Tool for Interoperability Testing of Web Services., , и . ICWS, стр. 409-416. IEEE Computer Society, (2014)Security issues of a phasor data concentrator for smart grid infrastructure., , , и . EWDC, стр. 3-8. ACM, (2011)