Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Ties and How to Find Them., , and . MENDEL, volume 837 of Advances in Intelligent Systems and Computing, page 16-26. Springer, (2017)Multi-Hub Location Heuristic for Alert Routing., , , and . IEEE Access, (2019)Resistance of IoT Sensors against DDoS Attack in Smart Home Environment., , and . Sensors, 20 (18): 5298 (2020)Quantitative Evaluation of SPH in TIG Spot Welding., , , , , , , and . CoRR, (2021)A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks., and . CSOC (1), volume 984 of Advances in Intelligent Systems and Computing, page 109-118. Springer, (2019)Remote experiment at universities., , , , and . IDAACS, page 929-934. IEEE, (2015)A Comparative Analysis of High Availability for Linux Container Infrastructures., , and . Future Internet, 15 (8): 253 (2023)Preparing and Managing the Remote Experiment in Education., and . Int. J. Online Eng., 9 (1): 21-25 (2013)Worst-case test network optimization for community detection method., , and . BCI, page 25:1-25:6. ACM, (2017)Application and Benchmark of SPH for Modeling the Impact in Thermal Spraying., , , , , , , , and . CoRR, (2021)