From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation on DSM power-saving implementation based on DEA model., , , и . ICNSC, стр. 1794-1799. IEEE, (2008)Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue., , , и . J. Enterp. Inf. Manag., 34 (3): 770-792 (2021)An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection., , , , и . QRS, стр. 122-129. IEEE, (2020)A Security Model and Implementation of Embedded Software Based on Code Obfuscation., , , , и . TrustCom, стр. 1606-1613. IEEE, (2020)A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level., , , , и . DSC, стр. 506-511. IEEE, (2022)Fake Review Detection Using Deep Neural Networks with Multimodal Feature Fusion Method., и . ICPADS, стр. 2869-2872. IEEE, (2023)Capability-based Component Security Mechanism for Microkernel OS., , , , , и . DSC, стр. 32-39. IEEE, (2022)How Does fake review Influence E-Commerce Platform Revenue?, и . APNOMS, стр. 1-4. IEEE, (2022)GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks., , , , и . DSC, стр. 237-244. IEEE, (2023)Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation., , , , и . DSC, стр. 375-382. IEEE, (2023)