From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security hardening of open source software., , и . PST, том 380 из ACM International Conference Proceeding Series, стр. 43. ACM, (2006)A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL., , и . QSIC, стр. 348-355. IEEE Computer Society, (2007)Delay aware measurements gathering in WAMS communication network., , , , и . GlobalSIP, стр. 1090-1094. IEEE, (2017)A Formal Approach for the Forensic Analysis of Logs., , и . SoMeT, том 147 из Frontiers in Artificial Intelligence and Applications, стр. 159-176. IOS Press, (2006)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , и . Technique et Science Informatiques, 28 (5): 611-644 (2009)Forensic analysis of logs: Modeling and verification., , , и . Knowl. Based Syst., 20 (7): 671-682 (2007)The multi-depot split-delivery vehicle routing problem: Model and solution algorithm., , , и . Knowl. Based Syst., (2014)BinComp: A stratified approach to compiler provenance Attribution., , , , и . Digit. Investig., (2015)Game theoretic models for detecting network intrusions., , , , и . Comput. Commun., 31 (10): 1934-1944 (2008)Verifying Security Properties of Cryptoprotocols: A Novel Approach., и . SEFM, стр. 349-360. IEEE Computer Society, (2007)