From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance., и . ICDF2C, том 31 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 139-150. Springer, (2009)Detection of side-channel communication in ad hoc networks using request to send (RTS) messages., , , , , , и . CCECE, стр. 1-6. IEEE, (2014)Workshop on cybersecurity: security and privacy in the 21st century., , , и . CASCON, стр. 366. ACM, (2009)Personalized-Adaptive Learning - A Model for CIT Curricula., , , , и . ICHL, том 8595 из Lecture Notes in Computer Science, стр. 266-277. Springer, (2014)Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces., , , , и . AVR (2), том 9769 из Lecture Notes in Computer Science, стр. 55-64. Springer, (2016)Statiscal-based skin classifier for omni-directional images., , и . VISAPP (Special Sessions), стр. 11-17. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)A monitoring system for detecting repeated packets with applications to computer worms., , и . Int. J. Inf. Sec., 5 (3): 186-199 (2006)Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs., , и . ANT/SEIT, том 83 из Procedia Computer Science, стр. 433-440. Elsevier, (2016)Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML., , , , , и . AINA Workshops (2), стр. 582-587. IEEE Computer Society, (2007)Crypto-assistant: Towards facilitating developer's encryption of sensitive data., , и . PST, стр. 342-346. IEEE Computer Society, (2014)