From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment., , , , и . ICC, стр. 1197-1202. IEEE, (2007)Wireless Local Area Network Performance in a Bluetooth Interference Environment., , , и . I. J. Wireless & Optical Communications, 2 (1): 19-34 (2004)Using qualia and multi-layered relationships in malware detection., , , , и . CICS, стр. 91-98. IEEE, (2009)Transform domain communications and interference avoidance using wavelet packet decomposition., , , и . WCNC, стр. 255-259. IEEE, (2002)Computer-Aided Breast Cancer Detection and Diagnosis of Masses Using Difference of Gaussians and Derivative-Based Feature Saliency., , , , , , и . IEEE Trans. Medical Imaging, 16 (6): 811-819 (1997)Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion., , , и . IEEE Secur. Priv., 4 (6): 36-43 (2006)Voice and video capacity of a secure IEEE 802.11g wireless network., , , , и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 13 (1): 26-34 (2009)Towards a Tree-Based Taxonomy of Anonymous Networks., , , , и . CCNC, стр. 1-2. IEEE, (2009)Refinements to the packet error rate upper bound for Bluetooth networks., , , и . IEEE Commun. Lett., 7 (8): 382-384 (2003)Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations., , , и . WCNC, стр. 678-682. IEEE, (2003)