From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardening Critical Infrastructure Networks Against Attacker Reconnaissance., и . QEST, том 12289 из Lecture Notes in Computer Science, стр. 258-275. Springer, (2020)Extensions of Network Reliability Analysis., , и . DSN, стр. 88-99. IEEE, (2019)Fusing Sensors for Occupancy Sensing in Smart Buildings., , , , , , и . ICDCIT, том 8956 из Lecture Notes in Computer Science, стр. 73-92. Springer, (2015)Invisible and forgotten: Zero-day blooms in the IoT., , и . PerCom Workshops, стр. 1-6. IEEE Computer Society, (2016)I Am Joe's Fridge: Scalable Identity in the Internet of Things., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 129-135. IEEE, (2016)An Approach to Incorporating Uncertainty in Network Security Analysis., , и . HotSoS, стр. 74-84. ACM, (2017)PhasorSec: Protocol Security Filters for Wide Area Measurement Systems., , , , , и . SmartGridComm, стр. 1-6. IEEE, (2018)Putting smart meters to work: beyond the usual., , , , , и . e-Energy, стр. 237-238. ACM, (2014)Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things., , и . IOT, стр. 12:1-12:7. ACM, (2019)Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems., , и . DSN, стр. 307-318. IEEE, (2022)