From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Decrypting live SSH traffic in virtual environments., , , и . CoRR, (2019)Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge., , , и . CoRR, (2019)IoT Forensics: Amazon Echo as a Use Case., , , , и . IEEE Internet of Things Journal, 6 (4): 6487-6497 (2019)Machine learning and semantic analysis of in-game chat for cyberbullying., , , и . CoRR, (2019)Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0., , , , , , и . CoRR, (2019)Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device., , , и . CoRR, (2019)Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction., , , и . CoRR, (2020)A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder., , , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 128:1-128:21 (2023)Fast contraband detection in large capacity disk drives., , и . Digit. Investig., (2015)LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments., , , , , и . IEEE Access, (2021)