From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GEIGER: Solution for small businesses to protect themselves against cyber-threats., , , и . ARES, стр. 157:1-157:4. ACM, (2021)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , и . CNSM, стр. 1-9. IEEE, (2019)The Forth International Workshop on Security Testing (SECTEST 2013)., и . ICST Workshops, стр. 433-434. IEEE Computer Society, (2013)Dynamic Deployment and Monitoring of Security Policies., , , , и . TrustBus, том 9264 из Lecture Notes in Computer Science, стр. 180-192. Springer, (2015)AI-Powered Penetration Testing using Shennina: From Simulation to Validation., , , , , , и . ARES, стр. 169:1-169:7. ACM, (2024)Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking., , и . ADHOC-NOW, том 5198 из Lecture Notes in Computer Science, стр. 345-356. Springer, (2008)5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , и . ARES, стр. 106:1-106:8. ACM, (2021)The DYNABIC approach to resilience of critical infrastructures., , , , , , , , , и 2 other автор(ы). ARES, стр. 136:1-136:8. ACM, (2023)Metrics-driven DevSecOps., , , и . ICSOFT, стр. 228-233. ScitePress, (2020)A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic., , , , , и . ICSOFT, стр. 234-241. SCITEPRESS, (2022)