From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability Analysis of Faults/Attacks in Network Centric Systems., , , , и . PDCS, стр. 256-261. ISCA, (2003)Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT., , , и . ACM Great Lakes Symposium on VLSI, стр. 691-696. ACM, (2023)Development of fluoroscopic registration in spinal neuronavigation., , , , , , , , и . CARS, том 1230 из International Congress Series, стр. 1236-1238. Elsevier, (2001)Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust., , и . ICCS, том 29 из Procedia Computer Science, стр. 1299-1313. Elsevier, (2014)Design Guidelines for Distributed Computing Systems., , , и . Int. CMG Conference, стр. 1065-1075. Computer Measurement Group, (1990)ExNet: An Intelligent Network Management System., и . WebNet, AACE, (1998)Value of service based resource management for large-scale computing systems., , , , , , и . Clust. Comput., 20 (3): 2013-2030 (2017)An explainable and efficient deep learning framework for video anomaly detection., , , , и . Clust. Comput., 25 (4): 2715-2737 (2022)Quasi-cliques Analysis for IRC Channel Thread Detection., , , , и . COMPLEX NETWORKS (1), том 812 из Studies in Computational Intelligence, стр. 578-589. Springer, (2018)Self-Protection for Unmanned Autonomous Vehicles (SP-UAV): Design Overview and Evaluation., и . ACSOS-C, стр. 128-132. IEEE, (2022)