From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying quorum role in network management., , , , и . Integrated Network Management, стр. 591-597. IEEE, (2009)A multi-domain role activation model., , , и . ICC, стр. 1-6. IEEE, (2017)Enabling Anomaly-based Intrusion Detection Through Model Generalization., , , и . ISCC, стр. 934-939. IEEE, (2018)Stream learning and anomaly-based intrusion detection in the adversarial settings., , , и . ISCC, стр. 773-778. IEEE Computer Society, (2017)A Distributed IDS for Ad Hoc Networks., , и . AINA Workshops, стр. 478-483. IEEE Computer Society, (2012)A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks., , , и . CCNC, стр. 287-291. IEEE, (2007)A Three-Ballot-Based Secure Electronic Voting System., , и . IEEE Secur. Priv., 6 (3): 14-21 (2008)How blockchains can improve measuring instruments regulation and control., , , , и . I2MTC, стр. 1-6. IEEE, (2018)Integral Federated Identity Management for Cloud Computing., , , и . NTMS, стр. 1-5. IEEE, (2012)BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks., , , и . Future Gener. Comput. Syst., (2019)