From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Handling Insider Threat Through Supervised Machine Learning Techniques., , , и . EUSPN/ICTH, том 177 из Procedia Computer Science, стр. 64-71. Elsevier, (2020)Decentralized Authentication for Secure Cloud Data Sharing., , , и . WETICE, стр. 95-99. IEEE Computer Society, (2018)Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware., , , и . WETICE, стр. 254-260. IEEE Computer Society, (2018)Impact of Machine-to-Machine Traffic on LTE Data Traffic Performance., , , , , и . LDIC, стр. 259-269. Springer, (2014)Resource allocation for energy efficiency optimization in uplink-downlink decoupled 5G heterogeneous networks., , , , , , и . Int. J. Commun. Syst., (2021)Energy Efficiency Optimization for Hybrid NOMA based Beyond 5G Heterogeneous Networks., , , , , и . VTC Fall, стр. 1-5. IEEE, (2021)Joint Secure User Association, Power and Subcarrier Allocation in Decoupled 5G Heterogeneous Network., , , , и . ICC, стр. 1-6. IEEE, (2021)On Hartley Image rejection receivers and adaptive sinusoidal interference cancellation in automotive wireless links., , , и . ITSC, стр. 508-513. IEEE, (2014)Eigenspace structure of a max-drast fuzzy matrix., , и . Fuzzy Sets Syst., (2014)Relay based clustering with least distance cluster head selection for wireless sensor networks., , и . ICCT, стр. 545-548. IEEE, (2013)