From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud., , , и . IEEE Trans. Serv. Comput., 13 (1): 114-129 (2020)A two-level solution to fight against dishonest opinions in recommendation-based trust systems., , , , и . CoRR, (2020)FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory., , , , и . IEEE/ACM Trans. Netw., 28 (4): 1779-1789 (2020)Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment., и . IEEE Trans. Network and Service Management, 17 (2): 1026-1039 (2020)An endorsement-based trust bootstrapping approach for newcomer cloud services., , , , , и . Inf. Sci., (2020)Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol., , , и . Wirel. Pers. Commun., 75 (3): 1747-1768 (2014)A Stackelberg game for distributed formation of business-driven services communities., , , и . Expert Syst. Appl., (2016)Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication., , , , и . CoRR, (2022)Data independent warmup scheme for non-IID federated learning., , , , , и . Inf. Sci., (апреля 2023)Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning?, , , и . IEEE Netw., 34 (6): 310-317 (2020)