From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Selective Defense for Application Layer DDoS Attacks., , и . JISIC, стр. 75-82. IEEE, (2014)Model-Based Safety and Security Engineering., , и . CoRR, (2018)Abstract Effects and Proof-Relevant Logical Relations, , и . CoRR, (2012)Compound noise analysis in digital circuits using blind source separation., , и . ISCAS, IEEE, (2006)On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report., , , , и . CoRR, (2021)Symbolic Timed Trace Equivalence., , и . Foundations of Security, Protocols, and Equational Reasoning, том 11565 из Lecture Notes in Computer Science, стр. 89-111. Springer, (2019)On the Complexity of Verification of Time-Sensitive Distributed Systems., , , , и . Protocols, Strands, and Logic, том 13066 из Lecture Notes in Computer Science, стр. 251-275. Springer, (2021)On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems., , , , , и . ICTAC, том 13572 из Lecture Notes in Computer Science, стр. 96-113. Springer, (2022)Maintaining distributed logic programs incrementally., , , и . PPDP, стр. 125-136. ACM, (2011)Automated Construction of Security Integrity Wrappers for Industry 4.0 Applications., и . WRLA@ETAPS, том 12328 из Lecture Notes in Computer Science, стр. 197-215. Springer, (2020)