From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and implementation of an efficient integer count sort in CUDA GPUs., , , и . Concurr. Comput. Pract. Exp., 23 (18): 2365-2381 (2011)Combinatorial Methods in Security Testing., , , и . Computer, 49 (10): 80-83 (2016)DAPHNE: A Disruption-Tolerant Application Proxy for e-Health Network Environments., и . MobiHealth, том 61 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 88-95. Springer, (2012)u'smile - Secure Mobile Environments., , , и . ERCIM News, (2017)An HMM-Based Anomaly Detection Approach for SCADA Systems., и . WISTP, том 9895 из Lecture Notes in Computer Science, стр. 85-99. Springer, (2016)Security challenges in embedded systems., и . ACM Trans. Embed. Comput. Syst., 12 (1s): 66:1-66:10 (2013)A Performance Assessment of Network Address Shuffling in IoT Systems., , , , и . EUROCAST (1), том 10671 из Lecture Notes in Computer Science, стр. 197-204. Springer, (2017)An Empirical Study on the Web Password Strength in Greece., , , и . Panhellenic Conference on Informatics, стр. 212-216. IEEE Computer Society, (2011)Optimizations for High-Performance IPsec Execution., , и . ICETE (Selected Papers), том 130 из Communications in Computer and Information Science, стр. 199-211. Springer, (2009)Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems., , и . NTMS, стр. 1-5. IEEE, (2011)