From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Runtime Attestation for IAAS Clouds., , , , , , и . CLOSER, стр. 233-247. SciTePress, (2018)Last hop topology sensitive multicasting key managment., и . Q2SWinet, стр. 63-70. ACM, (2005)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , и . Euro-Par, том 1685 из Lecture Notes in Computer Science, стр. 505-510. Springer, (1999)Predicting End-to-end Network Load., , , , и . ICMLA, стр. 917-920. IEEE Computer Society, (2010)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , и . ICDCS Workshops, стр. 99-106. IEEE Computer Society, (2005)An Approach to Secure Localization in WLANs., , и . WCNC, стр. 3145-3150. IEEE, (2008)Computing with time: microarchitectural weird machines., , , , , и . ASPLOS, стр. 758-772. ACM, (2021)Hybrid testbeds for QoS management in opaque MANETS., , , и . WICON, стр. 72. ICST, (2008)On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic., , , и . ICNC, стр. 1-6. IEEE Computer Society, (2012)QAM: A comprehensive QoS-aware Middleware suite for tactical communications., , , , , , , и . MILCOM, стр. 1586-1591. IEEE, (2011)