From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes., и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 422-434. Springer, (2017)Traffic Engineering in Enterprise Ethernet with Multiple Spanning Tree Regions., , , , и . Systems Communications, стр. 261-266. IEEE Computer Society, (2005)Cloaking RFID tags., , , и . CCNC, стр. 1036-1040. IEEE, (2011)Optimal Resource Allocation in SDN/NFV-Enabled Networks via Deep Reinforcement Learning., , и . ComNet, стр. 1-7. IEEE, (2022)Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification., и . CoRR, (2015)Security fusion based on state machine compositions., и . CICS, стр. 39-46. IEEE, (2011)A framework for automated evaluation of security metrics., и . ARES, стр. 89:1-89:11. ACM, (2020)On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) Paradigms., , и . CNS, стр. 353-358. IEEE, (2022)Differentiated Survivability in Ethernet-Based MAN/WAN., , , , , и . AICCSA, стр. 906-910. IEEE Computer Society, (2006)IllumiCore: Optimization Modeling and Implementation for Efficient VNF Placement., , , и . SoftCOM, стр. 1-7. IEEE, (2021)