From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC : Performance Analysis, , и . IJACSA - International Journal of Advanced Computer Science and Applications, 2 (3): 75--79 (2011)Model Based Migration of Cloud Systems: Review and Roadmap., , и . ICCSA (1), том 13375 из Lecture Notes in Computer Science, стр. 249-264. Springer, (2022)Data protection in cloud computing: A Survey of the State-of-Art., , и . KES, том 159 из Procedia Computer Science, стр. 155-161. Elsevier, (2019)Preventing Sybil attacks in chord and Kademlia protocols.. Int. J. Internet Protoc. Technol., 12 (3): 157-166 (2019)Towards a Better Security in Public Cloud Computing., , и . HIS, том 1179 из Advances in Intelligent Systems and Computing, стр. 441-453. Springer, (2019)Mitigation of Sybil Attacks in Structured P2P Overlay Networks., и . SKG, стр. 245-248. IEEE Computer Society, (2012)Securing Structured P2P Overlay Networks., и . 3PGCIC, стр. 37-43. IEEE, (2013)A novel replication technique to attenuate churn effects., и . Peer-to-Peer Netw. Appl., 9 (2): 344-355 (2016)A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks., и . AICCSA, стр. 128-134. IEEE Computer Society, (2017)Pollution Attacks Identification in Structured P2P Overlay Networks., , и . ICICS, том 10631 из Lecture Notes in Computer Science, стр. 674-686. Springer, (2017)