From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remote Attestation for HDD Files Using Kernel Protection Mechanism., , , и . ICC, стр. 1-6. IEEE, (2010)Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data., , , и . IoTBDS, стр. 78-87. SCITEPRESS, (2020)Identification of an IoT Device Model in the Home Domain Using IPFIX Records., , , и . COMPSAC, стр. 583-592. IEEE, (2022)Intrusion Detection for Encrypted Web Accesses., , , , и . AINA Workshops (1), стр. 569-576. IEEE Computer Society, (2007)A new timing extraction method and data interpolation for block demodulation., , и . ICASSP, стр. 1223-1226. IEEE, (1989)Web Tracking Site Detection Based on Temporal Link Analysis., , и . AINA Workshops, стр. 626-631. IEEE Computer Society, (2010)A Proposal for the Deterrence of Information Leakage Using Anti-virus Software., , , , и . NBiS, стр. 90-96. IEEE Computer Society, (2013)On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters., , и . TrustCom, стр. 1755-1762. IEEE Computer Society, (2012)Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure., , , , , , и . COSADE, том 7864 из Lecture Notes in Computer Science, стр. 169-183. Springer, (2013)LSM-Based Secure System Monitoring Using Kernel Protection Schemes., , , , и . ARES, стр. 591-596. IEEE Computer Society, (2010)