From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

System policies for gradual tuning of security and workload in wireless sensor networks., , и . WTS, стр. 1-6. IEEE, (2011)Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs., , , , и . IJCNN, стр. 1-8. IEEE, (2018)Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection., , , , и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 242-258. Springer, (2017)Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach., , и . IEEE Real-Time and Embedded Technology and Applications Symposium, стр. 128-137. IEEE Computer Society, (2005)A Protocol for Pervasive Distributed Computing Reliability., , , и . WiMob, стр. 574-579. IEEE Computer Society, (2008)A Friend or a Foe? Detecting Malware using Memory and CPU Features., , и . SECRYPT, стр. 73-84. SciTePress, (2016)A general practitioner or a specialist for your infected smartphone?, , и . CoRR, (2015)Run-time selection of security algorithms for networked devices., и . Q2SWinet, стр. 92-96. ACM, (2009)Time, accuracy and power consumption tradeoff in mobile malware detection systems., , и . Comput. Secur., (2019)IPSec Database Query Acceleration., , и . ICETE (Selected Papers), том 23 из Communications in Computer and Information Science, стр. 188-200. Springer, (2007)