From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 113-116. Kluwer, (2003)Improving Software Security Through an Integrated Approach., , и . SECRYPT, стр. 437-442. INSTICC Press, (2006)On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain., , , , и . IEEE Trans. Ind. Informatics, 16 (5): 3521-3530 (2020)Anti-phishing: A comprehensive perspective., , , , и . Expert Syst. Appl., 238 (Part F): 122199 (марта 2024)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context., , , и . IEEE Trans. Serv. Comput., 16 (3): 1647-1661 (мая 2023)Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification., , , и . CEC, стр. 1-8. IEEE, (2022)A Formal Security Design Approach for Transformation of Authorizations in Information Systems., и . PACIS, стр. 81. AISeL, (1997)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , и . MobiQuitous, том 73 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 186-197. Springer, (2010)A novel dynamic key management scheme for secure multicasting., , и . ICON, стр. 391-395. IEEE, (2003)Towards a Generic Logic for Analysing Network Protocols., , и . ICDCS Workshop on Internet, стр. A19-A26. (2000)