From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks., , и . ICC, стр. 1-6. IEEE, (2011)nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic., и . ICC, стр. 2700-2705. IEEE, (2012)Wi-Fi access denial of service attack to smartphones., , и . Int. J. Secur. Networks, 8 (3): 117-129 (2013)Harnessing the power of BitTorrent for distributed denial-of-service attacks., , , и . Secur. Commun. Networks, 4 (8): 860-870 (2011)Monitoring and early warning for internet worms., , , и . ACM Conference on Computer and Communications Security, стр. 190-199. ACM, (2003)Modeling Botnet Propagation Using Time Zones., , и . NDSS, The Internet Society, (2006)Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms., , , , и . MILCOM, стр. 672-678. IEEE, (2022)Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals., , и . ICCCN, стр. 1-6. IEEE Computer Society, (2009)PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks., , и . NCA, стр. 198-203. IEEE Computer Society, (2010)Extension of internet access to VANET via satellite receive-only terminals., , и . Int. J. Ad Hoc Ubiquitous Comput., 14 (3): 172-190 (2013)