From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies., , , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 203-215. Springer, (2010)Location-free link state routing for underwater acoustic sensor networks., , , , и . CCECE, стр. 1544-1549. IEEE, (2015)Learning to Communicate Underwater: An Exploration of Limited Mobility Agents., , , и . WUWNet, стр. 2:1-2:5. ACM, (2017)Spyware-Based Menaces Against Web Applications., и . INCoS, стр. 409-412. IEEE Computer Society, (2009)Towards an Automated and Dynamic Risk Management Response System., , , , , и . NordSec, том 10014 из Lecture Notes in Computer Science, стр. 37-53. (2016)Misconfiguration Management of Network Security Components., , и . CoRR, (2019)A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags., , и . Wireless Personal Communications, 59 (1): 27-42 (2011)Management of Exceptions on Access Control Policies., , и . SEC, том 232 из IFIP, стр. 97-108. Springer, (2007)Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks., , и . CoRR, (2023)Improved flooding of broadcast messages using extended multipoint relaying., , и . J. Netw. Comput. Appl., 34 (2): 542-550 (2011)