From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Natural Laws as a Baseline for Network Anomaly Detection., , и . Trustcom/BigDataSE/ISPA, стр. 370-377. IEEE, (2016)RECOUP: efficient reconfiguration for wireless sensor networks., , и . MobiQuitous, ICST / ACM, (2008)Policy based network management in high assurance environments., и . GLOBECOM, стр. 2151-2157. IEEE, (2004)Editorial: Special issue on Identity Protection and Management., , и . J. Inf. Secur. Appl., 19 (1): 1 (2014)Towards adaptive security for convergent wireless sensor networks in beyond 3G environments., , , , , , , , и . Wirel. Commun. Mob. Comput., 10 (9): 1193-1207 (2010)Integration and Management of Multiple Radios in Satellite-Terrestrial based Aeronautical Communication Networks., , , , , , , , , и . EAI Endorsed Trans. Ubiquitous Environ., 1 (1): e4 (2012)Image Classification using non-linear Support Vector Machines on Encrypted Data., , , , , , и . IACR Cryptol. ePrint Arch., (2017)Policy Based Management for Security in Cloud Computing., , , , , , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 130-137. Springer, (2011)Managing runtime re-engineering of a System-of-Systems for cyber security., и . SoSE, стр. 13-18. IEEE, (2011)Security Risk Assessment and Risk Treatment for Integrated Modular Communication., , и . ARES, стр. 503-509. IEEE Computer Society, (2016)