From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 663-678. Springer, (2010)AndRadar: Fast Discovery of Android Applications in Alternative Markets., , , , , , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 51-71. Springer, (2014)A Novel Protocol for Network-Controlled Metasurfaces., , , и . CoRR, (2018)CORONA: A Coordinate and Routing system for Nanonetworks., , , и . NANOCOM, стр. 18:1-18:6. ACM, (2015)Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain., , , , , , , , , и . CSR, стр. 464-469. IEEE, (2023)Demo: Detecting Third-Party Library Problems with Combined Program Analysis., , и . CCS, стр. 2429-2431. ACM, (2021)Security Applications of GPUs.. ENASE, стр. 5. SciTePress, (2019)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime., , , , , , , и . REFSQ Workshops, том 1342 из CEUR Workshop Proceedings, стр. 142-147. CEUR-WS.org, (2015)Botnet Attack Detection at the IoT Edge Based on Sparse Representation., , и . GIoTS, стр. 1-6. IEEE, (2019)