From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink., , , и . GLOBECOM, стр. 5091-5095. IEEE, (2008)A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA., , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-17. Springer, (2022)Survey on Domain Name System Security., , , , , и . DSC, стр. 602-607. IEEE Computer Society, (2016)Performance Analysis of Rotary Magnetorheological Brake With Multiple Fluid Flow Channels., , , и . IEEE Access, (2020)Improved group management protocol of RFID password method., , , , и . ICC, стр. 42:1-42:4. ACM, (2017)An Encrypted Malicious Traffic Detection System Based on Neural Network., , , и . CyberC, стр. 62-70. IEEE, (2019)Detecting Domain-Flux Malware Using DNS Failure Traffic., , , , , и . Int. J. Softw. Eng. Knowl. Eng., 28 (2): 151-174 (2018)Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems., , , и . ACM Great Lakes Symposium on VLSI, стр. 439-444. ACM, (2020)Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet., , , и . TrustCom, стр. 418-424. IEEE, (2020)KCC Method: Unknown Intrusion Detection Based on Open Set Recognition., , , и . ICTAI, стр. 1343-1347. IEEE, (2021)