From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario., , и . IEEE Access, (2023)Dynamic network slicing management of multimedia scenarios for future remote healthcare., , , , и . Multim. Tools Appl., 78 (17): 24707-24737 (2019)Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges., , , , и . ACM Comput. Surv., 55 (11): 222:1-222:36 (ноября 2023)Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management., , и . J. Netw. Comput. Appl., (октября 2023)A methodology to identify identical single-board computers based on hardware behavior fingerprinting., , , , , и . J. Netw. Comput. Appl., (марта 2023)Design of a recommender system based on users' behavior and collaborative location and tracking., , , и . J. Comput. Sci., (2016)PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation., , , , , , , , и . Sensors, 23 (3): 1658 (февраля 2023)An advanced certificate validation service and architecture based on XKMS., , , , и . Softw. Pract. Exp., 41 (3): 209-236 (2011)LWHBench Dataset., , , , , и . (марта 2022)5G-CAGE: A Context and Situational Awareness System for City Public Safety with Video Processing at a Virtualized Ecosystem., , , , и . ICCV Workshops, стр. 2749-2757. IEEE, (2019)