From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms., , , и . CoRR, (2022)A Comparative Study of ML-ELM and DNN for Intrusion Detection., , и . ACSW, стр. 1:1-1:7. ACM, (2021)Towards Effective Algorithms for Intelligent Defense Systems., и . CSS, том 7672 из Lecture Notes in Computer Science, стр. 498-508. Springer, (2012)Secure Fingerprint Authentication with Homomorphic Encryption., , , , и . DICTA, стр. 1-6. IEEE, (2020)Security Aspects of Military Sensor-Based Defence Systems., и . TrustCom/ISPA/IUCC, стр. 302-309. IEEE Computer Society, (2013)Extending the Business Rules Diagram Method to Web Based System Design., , и . ACIS, (2003)Controlled Android Application Execution for the IoT Infrastructure., , , , и . IoT 360 (1), том 169 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 16-26. (2015)Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One., , и . IEEE Trans. Inf. Forensics Secur., 12 (7): 1625-1636 (2017)Shared Use of Diagrams in Requirements Elicitation: roles, expectations and behaviours., , и . ACIS, (2002)Detection of Induced False Negatives in Malware Samples., и . PST, стр. 1-6. IEEE, (2021)