From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks., , , , и . WASA, том 9204 из Lecture Notes in Computer Science, стр. 50-59. Springer, (2015)Vehicle Anomaly Detection Based on Trajectory Data of ANPR System., , , и . GLOBECOM, стр. 1-6. IEEE, (2015)LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries., , , , , , , и . MILCOM, стр. 741-746. IEEE, (2023)An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification., , , , , и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 20-38. Springer, (2022)RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources., , , , и . EUC, стр. 197-204. IEEE Computer Society, (2011)ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing., , , , , , , , , и . ACSAC, стр. 849-860. ACM, (2021)ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks., , , , , и . IEEE Trans. Mob. Comput., 14 (10): 2130-2144 (2015)Exploiting ephemeral link correlation for mobile wireless networks., , , , , и . SenSys, стр. 239-252. ACM, (2012)Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis., , , , , , , и . USENIX Security Symposium, стр. 887-903. USENIX Association, (2019)HackMentor: Fine-Tuning Large Language Models for Cybersecurity., , , , , , , и . TrustCom, стр. 452-461. IEEE, (2023)