From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security hardening of open source software., , и . PST, том 380 из ACM International Conference Proceeding Series, стр. 43. ACM, (2006)Delay aware measurements gathering in WAMS communication network., , , , и . GlobalSIP, стр. 1090-1094. IEEE, (2017)A Formal Approach for the Forensic Analysis of Logs., , и . SoMeT, том 147 из Frontiers in Artificial Intelligence and Applications, стр. 159-176. IOS Press, (2006)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , и . Technique et Science Informatiques, 28 (5): 611-644 (2009)A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL., , и . QSIC, стр. 348-355. IEEE Computer Society, (2007)SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs., , , и . DIMVA, том 14828 из Lecture Notes in Computer Science, стр. 483-502. Springer, (2024)Forensic analysis of logs: Modeling and verification., , , и . Knowl. Based Syst., 20 (7): 671-682 (2007)The multi-depot split-delivery vehicle routing problem: Model and solution algorithm., , , и . Knowl. Based Syst., (2014)Game theoretic models for detecting network intrusions., , , , и . Comput. Commun., 31 (10): 1934-1944 (2008)Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective., , , , , и . DSN, стр. 562-573. IEEE Computer Society, (2018)