From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures., , , , , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 53-68. Springer, (2019)The SPIDER Cyber Security Investment Component (CIC)., , , , , и . CSR, стр. 415-421. IEEE, (2021)Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL, , , , , , и . (2020)Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks., , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 222-238. Springer, (2014)An UWB-based Location-Aided MAC Protocol for Wireless Sensor Networks., , , и . PIMRC, стр. 1-5. IEEE, (2007)Performance comparison of MANET routing protocols based on real-life scenarios., , и . ICUMT, стр. 870-877. IEEE, (2012)Predicting Euro Stock Markets., , и . IFIN/ISEM@INSCI, том 10078 из Lecture Notes in Computer Science, стр. 81-97. Springer, (2016)Evaluating selfishness impact on MANETs., , и . TEMU, стр. 64-68. IEEE, (2014)Global Communications Newsletter., , , , , , , и . IEEE Commun. Mag., 53 (12): 1-4 (2015)Fake Review Detection via Exploitation of Spam Indicators and Reviewer Behavior Characteristics., , и . SOFSEM, том 10706 из Lecture Notes in Computer Science, стр. 581-595. Springer, (2018)