From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Certificate Revocation Problem in the Maritime Sector., , , и . NordSec, том 12556 из Lecture Notes in Computer Science, стр. 142-157. Springer, (2020)Spam filter optimality based on signal detection theory., , , и . SIN, стр. 219-224. ACM, (2009)Analysis of Trusted Execution Environment usage in Samsung KNOX., , , , и . SysTEX@Middleware, стр. 7:1-7:6. ACM, (2016)Practical attacks against privacy and availability in 4G/LTE mobile communication systems., , , , и . CoRR, (2015)Experimental Analysis of the Femtocell Location Verification Techniques., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 49-54. Springer, (2010)A Security Architecture for 5G Networks., , , , , , , , , и 5 other автор(ы). IEEE Access, (2018)Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems., , , , и . NDSS, The Internet Society, (2016)Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications., , и . NDSS, The Internet Society, (2012)Anatomy of Commercial IMSI Catchers and Detectors., , , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)A Testbed for Advanced Distribution Management Systems: Assessment of Cybersecurity., , и . ISGT-Europe, стр. 1-5. IEEE, (2021)