From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , и . NOMS (1), стр. 277-290. IEEE, (2004)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , и . INFOCOM, стр. 968-976. IEEE, (2008)Measuring Message Propagation and Social Influence on Twitter.com., и . SocInfo, том 6430 из Lecture Notes in Computer Science, стр. 216-231. Springer, (2010)Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups., , , , , , и . CoRR, (2018)More or Less? Predict the Social Influence of Malicious URLs on Social Media., , , , , , , и . CoRR, (2018)Intrusion detection for link state routing protocol through integrated network management., , , и . ICCCN, стр. 634-639. IEEE, (1999)A property oriented fault detection approach for link state routing protocol., , и . ICCCN, стр. 114-119. IEEE, (2000)The implementation of data storage and analytics platform for big data lake of electricity usage with spark., , , и . J. Supercomput., 77 (6): 5934-5959 (2021)A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 96-107. Springer, (2005)MELDing transactions and objects., , и . OOPSLA/ECOOP Workshop on Object-based Concurrent Programming, стр. 94-98. ACM, (1990)