From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus., , , , , , и . IEEE Access, (2018)Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets., , , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 53-68. Springer, (2013)Network Security Situation Prediction Based on BP and RBF Neural Network., , , , и . ISCTCS, том 320 из Communications in Computer and Information Science, стр. 659-665. Springer, (2012)A Highly Efficient Remote Access Trojan Detection Method., , , и . Int. J. Digit. Crime Forensics, 11 (4): 1-13 (2019)Heterogeneous Distance Learning Based on Kernel Analysis-Synthesis Dictionary for Semi-Supervised Image to Video Person Re-Identification., , , , , , и . IEEE Access, (2020)Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section., , , , , и . IEEE Trans. Instrum. Meas., (2021)Coupled Inductance Model of Full-Bridge Modules in Hybrid High Voltage Direct Current Circuit Breakers., , , , и . IEEE Trans. Ind. Electron., 67 (12): 10315-10324 (2020)A Systematic Study of AI Applications in Cybersecurity Competitions., , , , , и . BigDataSE, стр. 138-146. IEEE, (2020)A novel learning framework for vocal music education: an exploration of convolutional neural networks and pluralistic learning approaches., и . Soft Comput., 28 (4): 3533-3553 (февраля 2024)Detecting compromised email accounts via login behavior characterization., , , , , , и . Cybersecur., 6 (1): 36 (декабря 2023)