From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement., , и . ICISSP, стр. 491-498. SCITEPRESS, (2022)A behavioural theory for intrusion detection system in mobile ad-hoc networks., и . HP3C, стр. 51-60. ACM, (2018)Counting the Cost in the Picalculus (Extended Abstract)., и . ICE@ICALP, том 229 из Electronic Notes in Theoretical Computer Science, стр. 117-129. Elsevier, (2008)On Efficiency Preorders., и . FSEN, том 8161 из Lecture Notes in Computer Science, стр. 83-94. Springer, (2013)A trust based model for recommendations of malignant people in social network., , , и . Int. J. Syst. Assur. Eng. Manag., 14 (1): 415-428 (февраля 2023)Multiple forgery detection in video using inter-frame correlation distance with dual-threshold., и . Multim. Tools Appl., 81 (30): 43979-43998 (2022)A trustworthy model of recommender system using hyper-tuned restricted boltzmann machine., , , и . Multim. Tools Appl., 82 (6): 8261-8285 (марта 2023)Deep feature based forgery detection in video using parallel convolutional neural network: VFID-Net., , и . Multim. Tools Appl., 81 (29): 42223-42240 (2022)Process Calculi for Intrusion Detection System in Mobile Ad-hoc Networks., и . J. Commun., 13 (Nocember): 635-647 (2018)A trust-worthy approach to recommend movies for communities., , и . Multim. Tools Appl., 81 (14): 19655-19682 (2022)