From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ELM-SOM+: A continuous mapping for visualization., , , , , и . Neurocomputing, (2019)SOM-ELM - Self-Organized Clustering using ELM., , , , , , , и . Neurocomputing, (2015)Spiking Networks for Improved Cognitive Abilities of Edge Computing Devices., , , , , и . CoRR, (2019)Guest Editorial: Trust, Security and Privacy of 6G., , , , , и . IEEE Netw., 36 (4): 100-102 (2022)On the Development of a Metric for Quality of Information Content over Anonymised Data-Sets., и . QUATIC, стр. 185-190. IEEE Computer Society, (2016)Mobile Subscriber Profile Data Privacy Breach via 4G Diameter Interconnection., , и . J. ICT Stand., 6 (3): 245-262 (2018)Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers., , , и . CIS, стр. 1016-1023. IEEE Computer Society, (2011)A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment., , , , , , и . SAFECOMP Workshops, том 11094 из Lecture Notes in Computer Science, стр. 87-98. Springer, (2018)A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning., , , , и . Cogn. Comput., 11 (2): 241-261 (2019)Security policies definition and enforcement utilizing policy control function framework in 5G., , , , , , и . Comput. Commun., (2021)