From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymity in Preference-Aware Location-based Services without Third Trusted-Party.. MobiQuitous, стр. 283-284. ICST / ACM, (2015)An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios., , , и . IET Inf. Secur., 17 (4): 553-566 (июля 2023)What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself., , , и . HPCC/CSS/ICESS, стр. 1221-1228. IEEE, (2014)ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing., , , и . HealthCom, стр. 1-8. IEEE, (2018)Distributed Provision and Management of Security Services in Globus Toolkit 4., , , , и . OTM Conferences (2), том 4276 из Lecture Notes in Computer Science, стр. 1325-1335. Springer, (2006)Collecting Experience Data from Remotely Hosted Learning Applications., , , , и . REV, 22, стр. 170-181. Springer, (2017)A privacy-preserving recommender system for mobile commerce.. CNS, стр. 725-726. IEEE, (2015)Bibliometric Analysis of the Last Ten Years of the European Conference on Technology-Enhanced Learning., , и . EC-TEL, том 12884 из Lecture Notes in Computer Science, стр. 337-341. Springer, (2021)Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture., , , и . International Conference on Computational Science, том 3038 из Lecture Notes in Computer Science, стр. 158-165. Springer, (2004)SUSAN: A Deep Learning based anomaly detection framework for sustainable industry., , , и . Sustain. Comput. Informatics Syst., (января 2023)