From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective acquaintance management for Collaborative Intrusion Detection Networks., , и . CNSM, стр. 158-165. IEEE, (2010)Network lifetime equalization in interconnected 802.15.4 clusters., , и . QSHINE, стр. 15. ACM, (2006)A Requirement-Oriented Design of NFV Topology by Formal Synthesis., , и . IEEE Trans. Network and Service Management, 16 (4): 1739-1753 (2019)Multi-View Permission Risk Notification for Smartphone System., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (1): 42-57 (2019)Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis., , и . J. Interconnect. Networks, 7 (1): 117-132 (2006)Adaptive Control for Smart Water Distribution Systems., , , , и . ISC2, стр. 1-6. IEEE, (2021)Design and Management of Collaborative Intrusion Detection Networks.. University of Waterloo, Ontario, Canada, (2013)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/7490).A Study on the Conspiracy Theory Propagation Network on Twitter., , , , и . NOMS, стр. 1-9. IEEE, (2023)Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks., и . MASCOTS, стр. 363-366. IEEE Computer Society, (2008)A scalable and flexible DDoS mitigation system using network function virtualization., , и . NOMS, стр. 1-6. IEEE, (2018)