From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , и . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)IFS - Intrusion forecasting system based on collaborative architecture., и . ICDIM, стр. 217-222. IEEE, (2009)Communication Middleware to Distributed Multimedia Application on High Speed Multi-service Networks: Design and experiences., , и . IMSA, стр. 294-299. IASTED/ACTA Press, (2002)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., и . ICITST, стр. 1-6. IEEE, (2009)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , и . ISCC, стр. 700-707. IEEE Computer Society, (2015)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , и . Int. J. Sens. Networks, 41 (3): 137-151 (2023)Privacy-preserving cloud-connected IoT data using context-aware and end-to-end secure messages., , , и . FNC/MobiSPC, том 191 из Procedia Computer Science, стр. 25-32. Elsevier, (2021)Evaluation of theora and speex performance in IP videoconferencing., , , и . WebMedia, стр. 135-138. ACM, (2012)Applying multi-correlation for improving forecasting in cyber security., , , и . ICDIM, стр. 179-186. IEEE, (2011)IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis., , , и . Wirel. Networks, 25 (4): 1533-1556 (2019)