From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics., , , , и . CoRR, (2019)Source camera identification: a distributed computing approach using Hadoop., , , , и . J. Cloud Comput., (2017)An Overview of Audio Event Detection Methods from Feature Extraction to Classification., , , , и . Appl. Artif. Intell., 31 (9-10): 661-714 (2017)Botnet detection techniques: review, future trends, and issues., , , , , и . J. Zhejiang Univ. Sci. C, 15 (11): 943-983 (2014)Discovering optimal features using static analysis and a genetic search based method for Android malware detection., , , и . Frontiers Inf. Technol. Electron. Eng., 19 (6): 712-736 (2018)Big data: From beginning to future., , , , , , и . Int. J. Inf. Manag., 36 (6): 1231-1247 (2016)Multi-objective scheduling of MapReduce jobs in big data processing., , , , , и . Multim. Tools Appl., 77 (8): 9979-9994 (2018)The Evolution of Android Malware and Android Analysis Techniques., , , , и . ACM Comput. Surv., 49 (4): 76:1-76:41 (2017)Secure and dependable software defined networks., , , , , , и . J. Netw. Comput. Appl., (2016)Routing protocol design for secure WSN: Review and open research issues., , , и . J. Netw. Comput. Appl., (2014)