From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , и . 5G World Forum, стр. 465-470. IEEE, (2019)Practical Intrusion Detection of Emerging Threats., , , и . IEEE Trans. Netw. Serv. Manag., 19 (1): 582-600 (2022)To All Intents and Purposes: Towards Flexible Intent Expression., , , и . NetSoft, стр. 31-37. IEEE, (2021)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , и . ACIIDS (Companion), том 1178 из Communications in Computer and Information Science, стр. 179-191. Springer, (2020)Multimodal QoE evaluation in P2P-based IPTV systems., , , , и . ACM Multimedia, стр. 1321-1324. ACM, (2011)Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems., , , , , и . CPSIOTSEC@CCS, стр. 63-68. ACM, (2021)Just Browsing?: Understanding User Journeys in Online TV., , , и . ACM Multimedia, стр. 965-968. ACM, (2014)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , и . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security., , , и . Comput. Secur., (2022)Reconciling community resource requirements in U-Nets., , , , и . U-NET@CoNEXT, стр. 19-24. ACM, (2009)