From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reasoning crypto ransomware infection vectors with Bayesian networks., , и . ISI, стр. 149-151. IEEE, (2017)Accelerating and tuning small matrix multiplications on Sunway TaihuLight: A case study of spectral element CFD Code Nek5000., , , , , , и . Int. J. High Perform. Comput. Appl., (2020)Blockchain Framework for Healthcare Data Management System in Clinical Trials., , и . FSDM, том 378 из Frontiers in Artificial Intelligence and Applications, стр. 824-832. IOS Press, (2023)Web Service Testing Tools: A Comparative Study., , , и . CoRR, (2013)A UAV-Assisted Authentication Protocol for Internet of Vehicles., , , , , и . IEEE Trans. Intell. Transp. Syst., 25 (8): 10286-10297 (августа 2024)An overview: multiscale simulation in understanding the radiation damage accumulation of reactor materials., , , , , , , и . Simul., (2021)Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol., , , и . Wireless Personal Communications, 42 (1): 49-62 (2007)Velocity-Dependent Nearest Neighbor Query., , , , , и . APWeb/WAIM (2), том 12859 из Lecture Notes in Computer Science, стр. 351-367. Springer, (2021)A Metamorphic Relation-Based Approach to Testing Web Services Without Oracles., , , , , и . Int. J. Web Serv. Res., 9 (1): 51-73 (2012)Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks., , и . J. Organ. Comput. Electron. Commer., 29 (1): 40-59 (2019)