From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cause-Based Classification Approach for Malicious DNS Queries Detected Through Blacklists., , , , и . IEEE Access, (2019)Multiple Station Aggregation Procedure for Radio-On-Demand WLANs., , , , и . BWCCA, стр. 156-161. IEEE, (2012)Unfair and Inefficient Share of Wireless LAN Resource among Uplink and Downlink Data Traffic and Its Solution., и . IEICE Trans. Commun., 88-B (4): 1577-1585 (2005)Performance evaluation of multi-hop communication with a dynamic channel switching scheme in ROD-SAN., , , , и . PACRIM, стр. 332-337. IEEE, (2015)Performance Evaluation of Transmission Order Control on Relay Nodes in Multi-hop Wireless Networks., , , , и . AINA Workshops, стр. 589-594. IEEE Computer Society, (2013)Performance Analysis of Energy Saving Scheme with Extra Active Period for LAN Switches., , , , и . GLOBECOM, стр. 198-203. IEEE, (2007)New TCP Congestion Control Schemes for Multimodal Mobile Hosts., , , и . IEICE Trans. Commun., 89-B (6): 1825-1836 (2006)Decentralized Access Point Selection Architecture for Wireless LANs., и . IEICE Trans. Commun., 90-B (9): 2513-2523 (2007)Developing a Concept Interface Design of ATM Systems Based on Human-Centred Design Processes., , , , , и . HCI (12), том 8015 из Lecture Notes in Computer Science, стр. 506-514. Springer, (2013)An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots., , , , и . IEICE Trans. Inf. Syst., 104-D (5): 669-672 (2021)