From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A systematic evaluation of cybersecurity metrics for dynamic networks., , , , и . Comput. Networks, (2018)Towards a deep learning-driven intrusion detection approach for Internet of Things., , , , и . Comput. Networks, (2021)An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm., , , , и . Comput. Networks, (2022)A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks., и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 462-475. Springer, (2014)Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches., , и . DSN Workshops, стр. 53-60. IEEE Computer Society, (2017)Optimal Deployments of Defense Mechanisms for the Internet of Things., , , и . SIoT, стр. 8-17. IEEE, (2018)Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention., , , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 28-41. Springer, (2013)Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis., , , и . Digit. Signal Process., (2020)Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks., , и . Comput. Networks, (апреля 2023)Composite Metrics for Network Security Analysis., , , и . CoRR, (2020)