From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Method for Combating Malicious Scripts Clickbots., , , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 523-538. Springer, (2009)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., и . SADFE, стр. 1-7. IEEE, (2013)Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization., , , , , и . HPCC/CSS/ICESS, стр. 1031-1036. IEEE, (2015)A robust group-based key management scheme for wireless sensor networks., и . WCNC, стр. 1915-1920. IEEE, (2005)EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network., , , , , и . IEEE Trans. Comput. Soc. Syst., 8 (2): 522-536 (2021)A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR)., , , , и . CoRR, (2023)Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions., , , и . Int. J. Fuzzy Syst., 21 (7): 2066-2076 (2019)PeerCredential: a reputation-based trust framework for Peer-to-Peer applications., , и . Int. J. Inf. Comput. Secur., 1 (3): 256-277 (2007)Formalizing the Transaction Flow Process of Hyperledger Fabric., , , , и . ICFEM, том 12531 из Lecture Notes in Computer Science, стр. 233-250. Springer, (2020)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , и . APSEC, стр. 355-362. IEEE, (2019)