From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Emulating a High Interaction Honeypot to Monitor Intrusion Activity., и . SSCC, том 377 из Communications in Computer and Information Science, стр. 70-76. Springer, (2013)Fast Verification of Digital Signatures in IoT., , и . SSCC, том 746 из Communications in Computer and Information Science, стр. 16-27. Springer, (2017)Fuzzy String Matching Algorithm for Spam Detection in Twitter., , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 289-301. Springer, (2018)An Enhanced Blacklist Method to Detect Phishing Websites., и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 323-333. Springer, (2017)Restraining add-on's behavior in private browsing., и . SECURIT, стр. 194-199. ACM, (2012)CP-ABE Scheme Satisfying Constant-size Keys based on ECC., и . ICETE (2), стр. 535-540. ScitePress, (2020)CatchPhish: detection of phishing websites by inspecting URLs., , и . J. Ambient Intell. Humaniz. Comput., 11 (2): 813-825 (2020)Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security., , и . ICISS, том 12553 из Lecture Notes in Computer Science, стр. 241-252. Springer, (2020)Throttling DDoS Attacks using Discrete Logarithm Problem., , и . SECRYPT, стр. 263-269. SciTePress, (2010)A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing., и . PReMI, том 13102 из Lecture Notes in Computer Science, стр. 357-365. Springer, (2021)