From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A taxonomy of electronic cash schemes., , , и . SEC, том 92 из IFIP Conference Proceedings, стр. 337-348. Chapman & Hall, (1997)Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining., , , и . NSS, том 9955 из Lecture Notes in Computer Science, стр. 499-506. Springer, (2016)A CNN Based Encrypted Network Traffic Classifier., , , и . ACSW, стр. 74-83. ACM, (2022)Encrypted Network Traffic Classification with Higher Order Graph Neural Network., , , , и . ACISP, том 13915 из Lecture Notes in Computer Science, стр. 630-650. Springer, (2023)Off-Line Fair Payment Protocols Using Convertible Signatures., и . ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 271-285. Springer, (1998)Internet-wide Scanning Taxonomy and Framework., , и . AISC, том 161 из CRPIT, стр. 61-65. Australian Computer Society, (2015)A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks., , , , и . ICECCS, стр. 117-122. IEEE, (2022)A User-Centric Protocol for Conditional Anonymity Revocation., , и . TrustBus, том 5185 из Lecture Notes in Computer Science, стр. 185-194. Springer, (2008)Modeling for performance and security balanced trading communication systems in the cloud., , , и . IPCCC, стр. 1-7. IEEE Computer Society, (2017)Strengthening SMS-Based Authentication through Usability., , , и . ISPA, стр. 683-688. IEEE Computer Society, (2008)