From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recovery Measure against Disabling Reassembly Attack to DNP3 Communication., , и . IEICE Transactions, 100-D (8): 1790-1797 (2017)SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing., , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2005)Toward Security Enhanced Provisioning in Industrial IoT Systems., , и . Sensors, 18 (12): 4372 (2018)High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions., , , и . IJDSN, (2014)Covert Channel Detection in the ICMP Payload Using Support Vector Machine., , , , и . ISCIS, том 2869 из Lecture Notes in Computer Science, стр. 828-835. Springer, (2003)Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol., и . SmartGridComm, стр. 557-563. IEEE, (2016)Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home., и . CISIS, стр. 779-783. IEEE Computer Society, (2010)Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology., , , и . ICITCS, стр. 1-4. IEEE Computer Society, (2014)A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network., и . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 89-99 (2016)Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks., , , и . Secur. Commun. Networks, 7 (8): 1292-1309 (2014)