From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments., , , , , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 146-155. CEUR-WS.org, (2017)Assessing data availability of Cassandra in the presence of non-accurate membership., , , и . DISCCO@SRDS, стр. 2:1-2:6. ACM, (2013)Android malware family classification based on resource consumption over time., , , , , и . MALWARE, стр. 31-38. IEEE Computer Society, (2017)Malware family identification with BIRCH clustering., , , , и . ICCST, стр. 1-6. IEEE, (2017)Adaptive online scheduling in storm., , и . DEBS, стр. 207-218. ACM, (2013)PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain., , , , , и . ITASEC, том 2058 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)Automatic Invariant Selection for Online Anomaly Detection., , , , , и . SAFECOMP, том 9922 из Lecture Notes in Computer Science, стр. 172-183. Springer, (2016)NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection., , , , , и . PRDC, стр. 11-20. IEEE Computer Society, (2015)An Architecture for Automatic Scaling of Replicated Services., , , , и . NETYS, том 8593 из Lecture Notes in Computer Science, стр. 122-137. Springer, (2014)Inter-domain stealthy port scan detection through complex event processing., , и . EWDC, стр. 67-72. ACM, (2011)