From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic Group Communication Security., , и . ISCC, стр. 49-56. IEEE Computer Society, (2001)A Remote Operations System Tailored to Application Requirements., и . ULPAA, том C-25 из IFIP Transactions, стр. 33-47. Elsevier, (1994)Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning., , и . NOMS, стр. 1-6. IEEE, (2023)Exploring Smartphone Application Usage Logs with Declared Sociological Information., , , и . BDCloud-SocialCom-SustainCom, стр. 266-273. IEEE Computer Society, (2016)Passive Monitoring of HTTPS Service Use., , , , и . CNSM, стр. 219-225. IEEE Computer Society, (2018)A Process Mining Approach for Supporting IoT Predictive Security., , и . NOMS, стр. 1-9. IEEE, (2020)A Process Mining Tool for Supporting IoT Security., , , и . NOMS, стр. 1-2. IEEE, (2020)Refining smartphone usage analysis by combining crowdsensing and survey., , , и . PerCom Workshops, стр. 366-371. IEEE Computer Society, (2015)FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps., , и . DAIS, том 11534 из Lecture Notes in Computer Science, стр. 116-132. Springer, (2019)Testing nearby peer-to-peer mobile apps at large., , и . MOBILESoft@ICSE, стр. 1-11. IEEE / ACM, (2019)