From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cloud Application for Security Service Level Agreement Evaluation., , и . CLOSER, стр. 299-307. SciTePress, (2014)Cloud Computing for Earth Surface Deformation Analysis via Spaceborne Radar Imaging: A Case Study., , , , , , , и . IEEE Trans. Cloud Comput., 4 (1): 104-118 (2016)A semantic enriched data model for sensor network interoperability., , , и . Simul. Model. Pract. Theory, 19 (8): 1745-1757 (2011)Towards Automatic Generation of Hardware Classifiers., , , , и . ICA3PP (2), том 8286 из Lecture Notes in Computer Science, стр. 125-132. Springer, (2013)A semantic based methodology to classify and protect sensitive data in medical records., , , и . IAS, стр. 240-246. IEEE, (2010)Optimizing secure Web Services with MAWeS: A case study., , , , и . SecureComm, стр. 144-153. IEEE, (2007)Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT., , , и . IEEE Trans. Ind. Informatics, 18 (11): 8282-8286 (2022)Combining contextualized word representation and sub-document level analysis through Bi-LSTM+CRF architecture for clinical de-identification., , , , и . Knowl. Based Syst., (2021)Scrum for safety: an agile methodology for safety-critical software systems., , , и . Softw. Qual. J., 30 (4): 1067-1088 (2022)Toward Automated Threat Modeling of Edge Computing Systems., , , и . CSR, стр. 135-140. IEEE, (2021)