From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of Routing Protocols for Multi-hop Communication in LPWAN., , и . NEW2AN/ruSMART, том 12525 из Lecture Notes in Computer Science, стр. 255-266. Springer, (2020)Leveraging FFT and Hybrid EfficientNet for Enhanced Action Recognition in Video Sequences., , , , и . SoICT, стр. 32-39. ACM, (2023)Determination of Subscribers Coordinates using Flying Network for Emergencies., , , , , и . ICACT, стр. 1309-1318. IEEE, (2022)A Horizontal Federated-Learning Model for Detecting Abnormal Traffic Generated by Malware in IoT Networks., , , , и . ICACT, стр. 28-36. IEEE, (2023)Malware Spreading Model for Routers in Wi-Fi Networks., , , , и . IEEE Access, (2022)Positioning Methods Based on Flying Network for Emergencies., , , , , и . ICACT, стр. 245-250. IEEE, (2020)Determination of Subscribers Coordinates using Flying Network for Emergencies., , , , , и . ICACT, стр. 1309-1318. IEEE, (2021)DeepPlace: Deep reinforcement learning for adaptive flow rule placement in Software-Defined IoT Networks., , , , и . Comput. Commun., (2022)Blockchain-Driven Hybrid Model for IoT Authentication., , , , и . NEW2AN, том 13772 из Lecture Notes in Computer Science, стр. 557-573. Springer, (2022)SafeDocs: A Machine Learning-Based Framework for Malicious PDF Detection Tailored for SMEs., , , , и . RIVF, стр. 295-300. IEEE, (2023)