From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A hybrid system to stimulate selfish nodes to cooperate in vehicular Delay-Tolerant Networks., , , и . ICC, стр. 5910-5915. IEEE, (2015)Predicting hypertensive disorders in high-risk pregnancy using the random forest approach., , , , и . ICC, стр. 1-5. IEEE, (2017)Detecting mobile botnets through machine learning and system calls analysis., , , , и . ICC, стр. 1-6. IEEE, (2017)A utility based access point selection method for IEEE 802.11 wireless networks with enhanced quality of experience., , и . ICC, стр. 2363-2368. IEEE, (2014)Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm., , , , и . ICC, стр. 1183-1187. IEEE, (2012)An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment., , , , и . ICC Workshops, стр. 1-6. IEEE, (2019)Co-channel interference modelling between RATs in heterogeneous wireless networks., , и . ICC, стр. 5321-5325. IEEE, (2012)SNetGNA communities: A new proposal of web application to online social networking management systems., , , и . ChinaCom, стр. 341-346. IEEE, (2014)Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks., , , , и . SoftCOM, стр. 1-5. IEEE, (2013)A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network., , , , , , и . Comput. J., 61 (7): 949-958 (2018)