From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Qualitative Approach to Information Availability., , и . SEC, том 175 из IFIP Conference Proceedings, стр. 37-48. Kluwer, (2000)E-Passports as a Means Towards the First World-Wide Public Key Infrastructure., и . EuroPKI, том 4582 из Lecture Notes in Computer Science, стр. 34-48. Springer, (2007)Attack Modeling of SIP-Oriented SPIT., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 299-310. Springer, (2007)Editorial., и . Comput. Secur., 29 (1): 1-2 (2010)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , и . ICETE (2), стр. 219-229. SciTePress, (2018)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)Security Busters: Web browser security vs. rogue sites., , , и . Comput. Secur., (2015)Revisiting Legal and Regulatory Requirements for Secure E-Voting., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 469-480. Kluwer, (2002)Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures., , , , и . SIGMETRICS Perform. Evaluation Rev., 45 (2): 119-124 (2017)Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0., , и . Int. J. Inf. Sec., 21 (1): 37-59 (2022)