From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A dynamic risk-based access control architecture for cloud computing., , и . NOMS, стр. 1-9. IEEE, (2014)Accounting management based service environment in a TINA architecture., , , и . ICC, стр. 2094-2099. IEEE, (2001)A Survey of Large Language Models in Cybersecurity., и . CoRR, (2024)Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing., и . CoRR, (2022)Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments., , и . Comput. Electr. Eng., (2022)Extending TINA with Secure On-Line Accounting Services., , , и . J. Netw. Syst. Manag., 11 (4): 379-397 (2003)Composition of a DIDS by integrating heterogeneous IDSs on grids., , , и . MGC@Middleware, стр. 12. ACM, (2006)Improving Cloud Computing Virtual Machines Balancing through Hosts and Virtual Machines Similarities., , и . SERVICES, стр. 76-85. IEEE Computer Society, (2017)Formal design of a telecommunications networks management system., , , , и . ISCC, стр. 146-150. IEEE Computer Society, (1997)Proactive network management using remote monitoring and artificial intelligence techniques., , , и . ISCC, стр. 167-171. IEEE Computer Society, (1997)