Author of the publication

Survey of data intensive computing technologies application to to security log data management.

, , and . BDCAT, page 268-273. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks., , , , and . IEEE Trans. Veh. Technol., 69 (12): 15815-15827 (2020)Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data., , , , , , , and . J. Supercomput., 80 (1): 1363-1364 (January 2024)Multimodal encoders and decoders with gate attention for visual question answering., and . Comput. Sci. Inf. Syst., 18 (3): 1023-1040 (2021)RESNETCNN: An abnormal network traffic flows detection model., , , , and . Comput. Sci. Inf. Syst., 20 (3): 997-1014 (2023)Range Difference-Based Target Localization Under Stratification Effect and NLOS Bias in UWSNs., , , , , and . IEEE Wirel. Commun. Lett., 11 (10): 2080-2084 (2022)MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture., , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 39 (2022)On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method., , , , , and . Comput. Stand. Interfaces, (January 2024)A blockchain-based secure storage scheme for medical information., , , , , and . CoRR, (2022)A two-stage intrusion detection approach for software-defined IoT networks., , , , and . Soft Comput., 25 (16): 10935-10951 (2021)Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey., , , , , , , and . Soft Comput., 26 (9): 4423-4440 (2022)