From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network., , и . IMIS, стр. 143-147. IEEE Computer Society, (2012)Analysis of Packet Size on VOIP Performance., , , , , и . International Conference on Internet Computing, стр. 996-1001. CSREA Press, (2002)Cyber Threats to Industrial Control Systems., , , , и . MIST@CCS, стр. 79-81. ACM, (2015)Study on Signature Verification Process for the Firmware of an Android Platform., , , , и . IMIS, том 773 из Advances in Intelligent Systems and Computing, стр. 540-545. Springer, (2018)Unintended Certificate Installation into Remote IoT Nodes., , , , и . IMIS, том 994 из Advances in Intelligent Systems and Computing, стр. 845-854. Springer, (2019)Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System., , , и . BWCCA, том 186 из Lecture Notes on Data Engineering and Communications Technologies, стр. 302-311. Springer, (2023)Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method., , , и . BWCCA, том 570 из Lecture Notes in Networks and Systems, стр. 215-223. Springer, (2022)Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D., , и . IMIS, том 279 из Lecture Notes in Networks and Systems, стр. 494-500. Springer, (2021)Precise Exposure Control for Efficient Eye Tracking., , и . IMIS, стр. 431-435. IEEE Computer Society, (2015)Vulnerability Analysis on the CNG Crypto Library., , и . IMIS, стр. 221-224. IEEE Computer Society, (2015)