From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protection Profile for Software Development Site., и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 499-507. Springer, (2005)Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model., и . KES (2), том 3682 из Lecture Notes in Computer Science, стр. 1069-1075. Springer, (2005)A class of zero-padded spreading sequences for MAI cancellation in DS-CDMA systems., , , , и . VTC Fall, стр. 2379-2383. IEEE, (2001)Security Evaluation Targets for Enhancement of IT Systems Assurance., и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 491-498. Springer, (2005)Threat Description for Developing Security Countermeasure., , , и . PCM (1), том 3331 из Lecture Notes in Computer Science, стр. 548-555. Springer, (2004)A Relationship Between Products Evaluation and IT Systems Assurance., и . KES (1), том 3681 из Lecture Notes in Computer Science, стр. 1125-1130. Springer, (2005)Performance analysis of Extended Non-Overlapping Binary Exponential Backoff algorithm over IEEE 802.15.4., , , и . Telecommun. Syst., 55 (1): 39-46 (2014)A terrain classification method for UGV autonomous navigation based on SURF., и . URAI, стр. 303-306. IEEE, (2011)Design Procedure of IT Systems Security Countermeasures., и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 468-473. Springer, (2005)