Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method of Operative Search of Solder Joints During Printed Circuit Boards Development., , , , , , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 1030-1041. CEUR-WS.org, (2019)Structural statistic method identifying facial images by contour characteristic points., , , , , and . IDAACS, page 293-297. IEEE, (2015)The monitoring system of DoS/DDoS attacks in the global network., , , and . IDAACS (2), page 791-794. IEEE, (2011)978-1-4577-1426-9.Security network interface for alarm systems., , , , and . Comput. Stand. Interfaces, 34 (6): 468-475 (2012)Optimization Methods on the Wavelet Transformation Base for Technical Diagnostic Information Systems., , , , , , , and . IDAACS, page 767-773. IEEE, (2021)Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based Systems., , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 267-276. CEUR-WS.org, (2020)Adaptive model of fermentation processes under uncertainty conditions., , , and . IDAACS, page 115-119. IEEE, (2013)Assessment of probabilistic parameters of alarm security detectors taking uncertain noise into account., , , , and . IDAACS (2), page 717-721. IEEE, (2011)978-1-4577-1426-9.Criteria to estimate quality of methods selecting contour inflection points., , , , , and . IDAACS, page 969-973. IEEE, (2017)Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , and . IDAACS-SWS, page 16-20. IEEE, (2018)