From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A game-theoretic model for defending against malicious users in RecDroid., и . IM, стр. 1339-1344. IEEE, (2015)Poster: SMURFEN: a rule sharing collaborative intrusion detection network., , , и . ACM Conference on Computer and Communications Security, стр. 761-764. ACM, (2011)On Node Population in a Multi-Level 802.15.4 Sensor Network., , и . GLOBECOM, IEEE, (2006)Automated synthesis of NFV topology: A security requirement-oriented design., , и . CNSM, стр. 1-5. IEEE Computer Society, (2017)Enhancing Twitter spam accounts discovery using cross-account pattern mining., , и . IM, стр. 491-496. IEEE, (2015)A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security., , , и . CDC/ECC, стр. 243-248. IEEE, (2011)ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds., , , , и . ICPADS, стр. 34-41. IEEE, (2018)A Survey on the Security Issues of QUIC., и . CSNet, стр. 1-8. IEEE, (2022)RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems., , , , , и . IEEE Trans. Netw. Serv. Manag., 21 (3): 3317-3329 (июня 2024)A Privacy-Aware Collaborative DDoS Defence Network., и . NOMS, стр. 1-5. IEEE, (2020)