From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design?, и . IEEE Access, (2023)Dynamic Denotational Semantics of Java., и . Formal Syntax and Semantics of Java, том 1523 из Lecture Notes in Computer Science, стр. 201-240. Springer, (1999)A Fast Boot, Fast Shutdown Technique for Android OS Devices., , , , и . Computer, 49 (7): 62-68 (2016)Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture., и . IRI, стр. 183-189. IEEE Systems, Man, and Cybernetics Society, (2007)HESTIA: Adversarial Modeling and Risk Assessment for CPCS., , , , , , , , и . IWCMC, стр. 226-231. IEEE, (2018)METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security., , , , , , , , и . MALWARE, стр. 95-102. IEEE, (2018)Security Policy Refinement: High-Level Specification to Low-Level Implementation., и . SocialCom, стр. 502-511. IEEE Computer Society, (2013)Experiments on Processing and Linking Semantically Augmented Requirement Specifications., и . HICSS, IEEE Computer Society, (2004)Security Tagging for a Zero-Kernel Operating System., и . HICSS, стр. 5049-5058. IEEE Computer Society, (2013)A Security Review of the Cell Broadband Engine Processor., , и . HICSS, стр. 1-8. IEEE Computer Society, (2010)