From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts., , , , , и . SpaCCS Workshops, том 10067 из Lecture Notes in Computer Science, стр. 342-357. (2016)Signature-Based Anomaly intrusion detection using Integrated data mining classifiers., , , , , и . ISBAST, стр. 232-237. IEEE, (2014)Reliable Access Control for Mobile Cloud Computing (MCC) With Cache-Aware Scheduling., , , и . IEEE Access, (2019)Analysis of Evidence Using Formal Event Reconstruction, , , и . CoRR, (2013)Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study., , , , и . IEEE Trans. Sustain. Comput., 4 (2): 204-216 (2019)Packet Header Anomaly Detection Using Statistical Analysis., , , , , и . SOCO-CISIS-ICEUTE, том 299 из Advances in Intelligent Systems and Computing, стр. 473-482. Springer, (2014)Mobile forensic data acquisition in Firefox OS., , , и . CyberSec, стр. 27-31. IEEE, (2014)A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services., , , , и . J. Comput. Sci., 11 (1): 89-97 (2015)Correction to: The Impact of Memory‑Efficient Bots on IoT‑WSN Botnet Propagation., , , и . Wirel. Pers. Commun., 119 (3): 2107 (2021)Analysis of Evidence Using Formal Event Reconstruction., , , и . ICDF2C, том 31 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 85-98. Springer, (2009)