From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware., , , , и . IEEE Access, (2021)Hand-based multibiometric systems: state-of-the-art and future challenges., , , , , и . PeerJ Comput. Sci., (2021)A social qualitative trust framework for Fog computing., , , , и . Comput. Electr. Eng., (2022)Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment., , , , , , , и . ICACS, стр. 1-8. IEEE, (2024)Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings., , и . IEEE Trans. Emerg. Top. Comput. Intell., 8 (2): 1640-1655 (апреля 2024)The reality of backdoored S-Boxes - An eye opener., , , , и . J. Inf. Secur. Appl., (февраля 2024)Privacy and security federated reference architecture for Internet of Things., , , , , и . Frontiers Inf. Technol. Electron. Eng., 24 (4): 481-508 (2023)On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions., , и . PeerJ Comput. Sci., (2021)Forensic Analysis of Social Networking Applications on an Android Smartphone., , , , , и . Wirel. Commun. Mob. Comput., (2021)Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework., , , , и . IEEE Internet Things J., 8 (8): 6359-6371 (2021)