From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection., , , , , и . COINS, стр. 172-178. ACM, (2019)Using Blockchains to Strengthen the Security of Internet of Things., , , , , , , , и . Euro-CYBERSEC, том 821 из Communications in Computer and Information Science, стр. 90-100. Springer, (2018)Supply Current Monitoring for Anomaly Detection on IoT Devices., , и . PCI, стр. 9:1-9:2. ACM, (2017)Compressing Time Series Towards Lightweight Integrity Commitments., , , , , , и . SEEDA-CECNSM, стр. 1-7. IEEE, (2023)Machine Learning for All: A More Robust Federated Learning Framework., и . ICISSP, стр. 544-551. SciTePress, (2019)Anomaly detection in IoT devices via monitoring of supply current., , , , и . ICCE-Berlin, стр. 1-4. IEEE, (2018)Security and Privacy in the Internet of Things Using Blockchain Technology., и . DCOSS, стр. 284-290. IEEE, (2019)A Test-Bed for Intrusion Detection Systems Results Post-processing., , и . EuroPKI, том 8341 из Lecture Notes in Computer Science, стр. 170-183. Springer, (2013)Evading Detection During Network Reconnaissance., , и . ICISSP, стр. 528-534. SciTePress, (2023)Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems., , , и . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, том 13106 из Lecture Notes in Computer Science, стр. 74-90. Springer, (2021)