From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning., , , , , , и . IWCMC, стр. 219-225. IEEE, (2018)Security management of cyber physical control systems using NIST SP 800-82r2., , , , и . IWCMC, стр. 1864-1870. IEEE, (2017)An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser., и . COMPSAC Workshops, стр. 382-387. IEEE Computer Society, (2016)978-1-4673-8845-0.Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities., и . BigDataSecurity/HPSC/IDS, стр. 102-106. IEEE, (2023)Using a knowledge-based security orchestration tool to reduce the risk of browser compromise., , , и . SSCI, стр. 1-8. IEEE, (2016)The Healthcare IoT Ecosystem: Advantages of Fog Computing Near the Edge., и . CHASE, стр. 51-56. ACM / IEEE, (2018)Requirements are the New Code., и . COMPSAC, стр. 691-694. IEEE Computer Society, (2016)Formal Verification and Visualization of Security Policies., , и . J. Comput., 3 (6): 22-31 (2008)MACH-T: A Behavior-based Mobile Node Trust Evaluation Algorithm., и . HICSS, стр. 5112-5121. ScholarSpace, (2023)MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks., и . MASS Workshops, стр. 152-157. IEEE, (2019)