From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Considerations for Using DPDK in a Hypervisor Virtual Environment., и . NBiS, том 1264 из Advances in Intelligent Systems and Computing, стр. 261-268. Springer, (2020)Performance evaluation on data management approach for multiple clouds using secret sharing scheme., , и . ICCE, стр. 471-473. IEEE, (2016)A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud., , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 888-900. Springer, (2017)Automatic LOD conversion system of tweet data associated with tourist spots., , , , , , и . GCCE, стр. 1-2. IEEE, (2016)A Distributed Log Management Method using a Blockchain Scheme., , и . ICCE, стр. 1-3. IEEE, (2020)A Study of Cost Structure Visualization for Digital Forensics Deployment., , , и . ACIT-CSI, стр. 428-431. IEEE, (2015)Utilizing obfuscation information in deep learning-based Android malware detection., и . COMPSAC, стр. 1321-1326. IEEE, (2021)Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale., , , и . CANDAR (Workshops), стр. 362-367. IEEE, (2020)Dynamic Authentication Method Dependent on Surrounding Environment., , , и . GCCE, стр. 855-857. IEEE, (2018)Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines., , , , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 413-422. Springer, (2019)