From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions., , , , и . CoRR, (2015)CED2: Communication Efficient Disjointness Decision., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 290-306. Springer, (2010)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation., , и . EURASIP J. Wireless Comm. and Networking, (2011)Time Warp: How Time Affects Privacy in LBSs., , , и . ICICS, том 6476 из Lecture Notes in Computer Science, стр. 325-339. Springer, (2010)Intelligent conditional collaborative private data sharing., , , и . Future Gener. Comput. Syst., (2019)DDoS victim service containment to minimize the internal collateral damages in cloud computing., , , , и . Comput. Electr. Eng., (2017)A lightweight mechanism for detection of cache pollution attacks in Named Data Networking., , и . Comput. Networks, 57 (16): 3178-3191 (2013)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , и . CoRR, (2019)