From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Assessing the security of VoIP Services., , , и . Integrated Network Management, стр. 373-382. IEEE, (2007)Policy based management of wireless networks., и . Net-Con, том 235 из IFIP Conference Proceedings, стр. 15-26. Kluwer, (2002)ROSploit: Cybersecurity Tool for ROS., , и . IRC, стр. 415-416. IEEE, (2019)And/Or Trees for Knowledge Representation., и . ECSQARU, том 946 из Lecture Notes in Computer Science, стр. 405-411. Springer, (1995)VecHGrad for solving accurately complex tensor decomposition., , , и . CoRR, (2019)Recurrent Dynamical Projection for Time Series-Based Fraud Detection., и . ICANN (2), том 10614 из Lecture Notes in Computer Science, стр. 503-511. Springer, (2017)VoIP Malware: Attack Tool & Attack Scenarios., , и . ICC, стр. 1-6. IEEE, (2009)On importance weighting for electric fraud detection with dataset shifts., и . SMC, стр. 3235-3242. IEEE, (2019)Service management for multi-operator heterogeneous networks., , , и . GLOBECOM, стр. 2069-2073. IEEE, (2002)MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning., , , и . MIDAS@PKDD, том 11985 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2019)