From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quality of service analysis of a wireless ATM network access point., , , и . ICC, стр. 226-230. IEEE, (1999)EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning., , и . IWSPA@CODASPY, стр. 65-72. ACM, (2017)Policy-Based Profiles for Network Intrusion Response Systems., , и . CSR, стр. 279-286. IEEE, (2022)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , и . VTC2023-Spring, стр. 1-6. IEEE, (2023)DEV-PIM: Dynamic Execution Validation with Processing-in-Memory., , , , , и . ETS, стр. 1-6. IEEE, (2023)Low power Gm-boosted differential Colpitts VCO., , , , , и . SoCC, стр. 247-250. IEEE, (2011)Detecting packed executables using steganalysis., , , и . EUVIP, стр. 1-5. IEEE, (2014)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , и . SECRYPT, стр. 327-335. SciTePress, (2016)High-Performance random data lookup for network processing., , , и . SoCC, стр. 272-277. IEEE, (2010)PageRank in malware categorization., , , и . RACS, стр. 291-295. ACM, (2015)