From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Investigation of the M2/G2/1/∞,N queue with restricted admission of priority customers and its application to HSDPA mobile systems., , , и . Comput. Networks, 53 (8): 1186-1201 (2009)Implementation and Evaluation of Measurement-Based Admission Control Schemes Within a Converged Networks QoS Management Framework.. CoRR, (2013)Improving dynamic analysis of android apps using hybrid test input generation., , и . Cyber Security, стр. 1-8. IEEE, (2017)N-gram Opcode Analysis for Android Malware Detection., , , и . Int. J. Cyber Situational Aware., 1 (1): 231-255 (2016)High accuracy android malware detection using ensemble learning., , и . IET Inf. Secur., 9 (6): 313-320 (2015)Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks., и . CoRR, (2016)Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation., , , и . Future Internet, 4 (3): 646-671 (2012)Android Malware Detection Using Parallel Machine Learning Classifiers., , и . NGMAST, стр. 37-42. IEEE, (2014)Performance Evaluation and Resource Management of Hierarchical MACRO-/MICRO Cellular Networks using MOSEL-2., , и . Wirel. Pers. Commun., 44 (2): 153-179 (2008)Deep Android Malware Detection., , , , , , , , , и 1 other автор(ы). CODASPY, стр. 301-308. ACM, (2017)