From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems., , и . J. Inf. Secur. Appl., (2016)Smart Homes: Security Challenges and Privacy Concerns., , , , и . CoRR, (2020)RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks., , , , и . CoRR, (2018)Security and Privacy in Fog Computing: Challenges., , , , , , и . IEEE Access, (2017)An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks., , , , и . IEEE Access, (2022)Reliability, Security, and Privacy in Power Grids., , , , и . Computer, 55 (9): 85-88 (2022)Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector., , , , и . Int. J. Medical Informatics, (2019)Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security., , , , , , и . Sensors, 19 (14): 3119 (2019)Coupling of the synchronization stations of an Extended Kanban system.. EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (4): e5 (2015)FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things., , , , , и . J. Parallel Distributed Comput., (2022)