From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network intrusion detection system: A systematic study of machine learning and deep learning approaches., , , , и . Trans. Emerg. Telecommun. Technol., (2021)TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network., , , и . Int. J. Netw. Manag., (мая 2024)Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET., , , , и . Sensors, 19 (22): 4954 (2019)A graph-theoretic approach for the detection of phishing webpages., , , , , и . Comput. Secur., (2020)Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network., , , , , , , и . IEEE Access, (2023)Blended system thinking approach to strengthen the education and training in university-industry research collaboration., , , , и . Technol. Anal. Strateg. Manag., 34 (4): 447-460 (2022)Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks., , , , , , , и . IEEE Access, (2022)A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network., , , и . IEEE Access, (2021)Image-based Agarwood Resinous Area Segmentation using Deep Learning., , и . CoRR, (2024)Analyzing the Role of Human Capital in Strengthening National Innovation System Through University-Industry Research Collaboration: A TRIZ-Based Approach., , , и . TFC, том 655 из IFIP Advances in Information and Communication Technology, стр. 417-428. Springer, (2022)