Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
1
Interactive Environment for Effective Cybersecurity Teachin..:
, In:
?
2023 12th Mediterranean Conference on Embedded Computing (MECO) ,
2
Side-Channel Analysis of Cryptographic Processor CEC 1702:
, In:
?
2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) ,
3
Implementation and Field Testing of V2V Vehicle Stopping Sy..:
, In:
?
2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) ,
6
Efficient Web Application Mapping During the Reconnaissance..:
, In:
?
2022 45th International Conference on Telecommunications and Signal Processing (TSP) ,
7
Capturing the Vehicle to Everything Communication Using Sof..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
8
On Secure and Side-Channel Resistant Hardware Implementatio..:
, In:
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
9
Manager Asks: Which Vulnerability Must be Eliminated First?:
, In:
?
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) ,
10
Detection of wireless fake access points:
, In:
?
2020 4th Cyber Security in Networking Conference (CSNet) ,
11
Simplified Method for Fast and Efficient Incident Detection..:
, In:
?
2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) ,
12
Privacy-enhancing Cloud Computing Solution for Big Data:
, In:
?
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security ,
13