From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LSHiForest: A Generic Framework for Fast Tree Isolation based Ensemble Anomaly Analysis, , , , , , и . (2017)SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud., , , , , и . Concurr. Comput. Pract. Exp., 25 (18): 2561-2576 (2013)A data-operation model based on partial vector space for batch processing in workflow., , , и . Concurr. Comput. Pract. Exp., 23 (16): 1936-1950 (2011)HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing., , , , и . Concurr. Comput. Pract. Exp., 28 (3): 646-660 (2016)Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams., и . World Wide Web, 25 (5): 2163-2183 (2022)CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing., , , и . IACR Cryptology ePrint Archive, (2012)CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing., , , и . Future Gener. Comput. Syst., 29 (5): 1300-1308 (2013)A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment., , , , , и . Future Gener. Comput. Syst., (2018)Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things., , , , , и . Secur. Commun. Networks, (2019)A Privacy Preserving Platform for MapReduce., , и . ATIS, том 719 из Communications in Computer and Information Science, стр. 88-99. Springer, (2017)