From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Imbalanced Adversarial Training with Reweighting., , , , , и . CoRR, (2021)Cyberphysical systems security applied to telesurgical robotics., и . Comput. Stand. Interfaces, 34 (1): 225-229 (2012)Exploiting an antivirus interface., , , , и . Comput. Stand. Interfaces, 31 (6): 1182-1189 (2009)Cloud Governance.. CLOUD, стр. 86-90. IEEE, (2020)WS-Sim: A Web Service Simulation Toolset with Realistic Data Support., , и . COMPSAC Workshops, стр. 109-114. IEEE Computer Society, (2010)Data Mining for Security Applications., , , и . EUC (2), стр. 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.Design and Implementation of a Semantic Web-Based Inference Controller: A Summary., , , и . IRI, стр. 451-456. IEEE Computer Society, (2015)Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students., , , , , , и . IWSPA@CODASPY, стр. 55-57. ACM, (2015)Incentive and Trust Issues in Assured Information Sharing., , и . CollaborateCom, том 10 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 113-125. Springer / ICST, (2008)Differences in Fitts' Law Task Performance Based on Environment Scaling., и . EuroHaptics, том 5024 из Lecture Notes in Computer Science, стр. 295-300. Springer, (2008)