From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices., , , , , , и . AsiaJCIS, стр. 9-15. IEEE, (2019)Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT., , и . IEEE Internet Things Mag., 5 (3): 76-81 (2022)Non-invasive liquid level detection with dielectric capacitive method., , , , и . ISCE, стр. 117-118. IEEE, (2013)DDoS Attacks in Experimental LTE Networks., , и . AINA Workshops, том 1150 из Advances in Intelligent Systems and Computing, стр. 545-553. Springer, (2020)Hash-Based Function Call Graph Fusion Method for IoT Malware Detection., , , и . WPMC, стр. 159-164. IEEE, (2023)An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds., , , , , , , , и . CoRR, (2020)ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , и . SP (Workshops), стр. 126. IEEE, (2020)Conformance Testing for 5G O-RAN Entities through MEC., , и . CANDARW, стр. 330-336. IEEE, (2022)On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp., , , и . WPMC, стр. 288-292. IEEE, (2023)Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization., , и . VTC Fall, стр. 1-6. IEEE, (2019)