From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Co-Clustering Host-Domain Graphs to Discover Malware Infection., , , , , и . AIAM (ACM), стр. 49:1-49:6. ACM, (2019)A Hybrid Covert Channel with Feedback over Mobile Networks., , , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 87-94. Springer, (2019)An RTP Extension for Reliable User-Data Transmission over VoIP Traffic., , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 74-86. Springer, (2019)AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism., , , , и . ICC, стр. 1-6. IEEE, (2021)A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures., , , , и . KSEM (3), том 13370 из Lecture Notes in Computer Science, стр. 27-38. Springer, (2022)Propagation modeling of active P2P worms based on ternary matrix., , , , и . J. Netw. Comput. Appl., 36 (5): 1387-1394 (2013)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , и . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)An Anti-Forensics Method against Memory Acquiring for Android Devices., , , , , и . CSE/EUC (1), стр. 214-218. IEEE Computer Society, (2017)Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation., , , , и . WCNC, стр. 1533-1538. IEEE, (2022)Building Undetectable Covert Channels Over Mobile Networks with Machine Learning., , , и . ML4CS (1), том 12486 из Lecture Notes in Computer Science, стр. 331-339. Springer, (2020)