From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Countermeasures for Mitigating ICN Routing Related DDoS Attacks., , и . SecureComm (2), том 153 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 84-92. Springer, (2014)TRUST-CAP: A Trust Model for Cloud-Based Applications., , , и . COMPSAC (2), стр. 584-589. IEEE Computer Society, (2017)978-1-5386-0367-3.Survey and taxonomy of information-centric vehicular networking security attacks., , , и . Ad Hoc Networks, (2022)A Survey of Security Attacks in Information-Centric Networking, , и . (14.01.2015)Segmented OTA Platform Over ICN Vehicular Networks., , , и . Mob. Networks Appl., 27 (3): 1327-1336 (2022)DACPI: A decentralized access control protocol for information centric networking., , и . ICC, стр. 1-6. IEEE, (2016)Preventing unauthorized access in information centric networking., , и . Secur. Priv., (2018)Detection and Prevention of Malicious Requests in ICN Routing and Caching., , и . CIT/IUCC/DASC/PICom, стр. 1741-1748. IEEE, (2015)Vehicle Software Update over ICN Architectures., , , , , и . ADHOCNETS, том 345 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 44-54. Springer, (2020)Evaluation of Wireless Deauthentication Attacks and Countermeasures on Autonomous Vehicles., , , и . DSA, стр. 494-501. IEEE, (2023)