From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virtualization of the Encryption Card for Trust Access in Cloud Computing., , , , , и . IEEE Access, (2017)Heterogeneous differential privacy for vertically partitioned databases., , , , и . Concurr. Comput. Pract. Exp., (2021)Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management., , , , , , , и . IEEE Trans. Netw. Sci. Eng., 7 (4): 2541-2554 (2020)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , и . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning., , , , , и . CoRR, (2021)Building Automated Trust Negotiation architecture in virtual computing environment., , , и . J. Supercomput., 55 (1): 69-85 (2011)A dynamic predictive race detector for C/C++ programs., , , , и . J. Supercomput., 73 (9): 3999-4019 (2017)An adaptive meta-scheduler for data-intensive applications., , , и . Int. J. Grid Util. Comput., 1 (1): 32-37 (2005)RT-Grid: A QoS Oriented Service Grid Framework., , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 345-348. Springer, (2004)Network intrusion detection based on the temporal convolutional model., , , , , , и . Comput. Secur., (декабря 2023)