From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited., , и . SEC, том 625 из IFIP Advances in Information and Communication Technology, стр. 53-65. Springer, (2021)A Framework for On-Demand Reporting of Cryptocurrency Ownership and Provenance., , и . BLOCKCHAIN, том 1238 из Advances in Intelligent Systems and Computing, стр. 131-143. Springer, (2020)Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study., , , и . UbiSec, том 1768 из Communications in Computer and Information Science, стр. 193-206. Springer, (2022)System Protection Agent Against Unauthorized Activities via USB Devices., , и . IoTBDS, стр. 237-243. SciTePress, (2018)Autotuning and adaptivity approach for energy efficient Exascale HPC systems: The ANTAREX approach., , , , , , , , , и 6 other автор(ы). DATE, стр. 708-713. IEEE, (2016)Autotuning and adaptivity in energy efficient HPC systems: the ANTAREX toolbox., , , , , , , , , и 15 other автор(ы). CF, стр. 270-275. ACM, (2018)Industrial Data Sharing Ecosystems: An Innovative Value Chain Traceability Platform Based in Data Spaces., , , , , и . WorldCIST (3), том 987 из Lecture Notes in Networks and Systems, стр. 423-432. Springer, (2024)On Expressing Strategies for Directive-Driven Multicore Programing Models., , , , и . PARMA-DITAM@HiPEAC, стр. 7-12. ACM, (2014)ORAT - An Open Redirect Analysis Tool., , и . ISDFS, стр. 1-5. IEEE, (2024)Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports., , и . BLOCKCHAIN, том 778 из Lecture Notes in Networks and Systems, стр. 154-163. Springer, (2023)