Search for persons
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
2
A Methodology for Training Homomorphic Encryption Friendly ..:
, In:
?
Cyber-Physical Security for Critical Infrastructures Protection; Lecture Notes in Computer Science ,
3
A Cloud-Based Anomaly Detection for IoT Big Data:
, In:
?
Proceedings of the 10th ACM International Systems and Storage Conference ,
4
Big data analysis of cloud storage logs using spark:
, In:
?
Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control ,
5
Requirements for hybrid cosimulation standards:
, In:
?
Proceedings of the 52nd Annual Design Automation Conference ,
7
System simulation from operational data:
, In:
?
Proceedings of the 51st Annual Design Automation Conference ,
8
Using a High-Level Test Generation Expert System for Testin..:
, In:
?
Proceedings of the Eleventh ACM International Conference on Embedded Software ,
9