From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Methodology for Effective Requirements Elicitation and Modeling., , и . ICCSA (4), том 10963 из Lecture Notes in Computer Science, стр. 474-487. Springer, (2018)Modeling Software Security Requirements Through Functionality Rank Diagrams., , и . ICCSA (5), том 9790 из Lecture Notes in Computer Science, стр. 398-409. Springer, (2016)Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities., , и . Int. J. Secur. Networks, 11 (1/2): 48-65 (2016)Reputation-Based Trust for Mobile Agents., , и . ADCONS, том 7135 из Lecture Notes in Computer Science, стр. 486-494. Springer, (2011)CrossFeat: Multi-scale Cross Feature Aggregation Network for Hand Gesture Recognition., , , и . ICIIS, стр. 274-279. IEEE, (2020)Base Station Controlled and Energy Efficient Centralized Hierarchical Routing Protocol (BSEECH)., , и . iNIS, стр. 262-267. IEEE, (2015)XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications., , , и . ICACCI, стр. 2010-2015. IEEE, (2015)A new hybrid approach for overlay construction in P2P live streaming., , и . ICACCI, стр. 431-437. IEEE, (2015)A Hybrid Approach of Personalized Web Information Retrieval., , , и . Web Intelligence, стр. 308-313. IEEE Computer Society, (2010)A secure software design methodology., , и . ICACCI, стр. 2484-2488. IEEE, (2016)