From post

Computer-Aided Reverse Engineering of Protected Software.

, , и . CyberSec4Europe, том 1807 из Communications in Computer and Information Science, стр. 3-15. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-intrusive authentication., , и . SEC, том 92 из IFIP Conference Proceedings, стр. 440-451. Chapman & Hall, (1997)The FICEP Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud., , , , и . e-Democracy, том 792 из Communications in Computer and Information Science, стр. 196-210. Springer, (2017)Decentralised Access Control in 802.11 Networks., , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2005)Privacy-by-design cloud computing through decentralization and real life trust., и . P2P, стр. 1-2. IEEE, (2013)An Estimation of Attack Surface to Evaluate Network (in)security., и . ICEIS (3), стр. 493-497. (2007)A model of capabilities of Network Security Functions., , , , и . NetSoft, стр. 474-479. IEEE, (2022)Why to adopt a security metric? A brief survey., и . Quality of Protection, том 23 из Advances in Information Security, Springer, (2006)SHIELD: A novel NFV-based cybersecurity framework., , , , , , , , , и 18 other автор(ы). NetSoft, стр. 1-6. IEEE, (2017)A study of the resetability of synchronous sequential circuits., и . Microprocess. Microprogramming, 38 (1-5): 395-402 (1993)On the Performance of Secure Vehicular Communication Systems., , , и . IEEE Trans. Dependable Secur. Comput., 8 (6): 898-912 (2011)