From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Synthesis and Ranking of Secure BPMN Orchestrators., , , , , и . Int. J. Secur. Softw. Eng., 5 (2): 44-64 (2014)Enforcing Mobile Application Security Through Probabilistic Contracts., , , и . ESSoS Doctoral Symposium, том 1298 из CEUR Workshop Proceedings, CEUR-WS.org, (2014)EARNEST: A challenge-based intrusion prevention system for CAN messages., , и . ISSRE Workshops, стр. 243-248. IEEE, (2020)Full-protocol safety analysis of CINNAMON., , и . VTC Spring, стр. 1-7. IEEE, (2022)Presente Digitale: An Online Education System for Teachers., , , , и . HELMeTO, том 1344 из Communications in Computer and Information Science, стр. 271-285. Springer, (2020)Extending Security-by-Contract with Quantitative Trust on Mobile Devices., , , , , и . CISIS, стр. 872-877. IEEE Computer Society, (2010)A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property., , , и . FACS, том 10231 из Lecture Notes in Computer Science, стр. 134-152. (2016)Controlled data sharing in E-health., , , и . STAST, стр. 17-23. IEEE, (2011)Are you secure in your car?: poster., , , и . WiSec, стр. 308-309. ACM, (2019)Trust-Driven Policy Enforcement through Gate Automata., и . IMIS, стр. 208-215. IEEE Computer Society, (2011)