From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear., , и . CODASPY, стр. 345-356. ACM, (2014)Profit-aware Admission Control for Overload Protection in E-commerce Web Sites., и . IWQoS, стр. 188-193. IEEE, (2007)Email as a Master Key: Analyzing Account Recovery in the Wild., , и . INFOCOM, стр. 1646-1654. IEEE, (2018)Tracking Skype VoIP Calls Over The Internet., , , , и . INFOCOM, стр. 96-100. IEEE, (2010)The Impact of Deep Learning on Organizational Agility., , и . ICIS, Association for Information Systems, (2019)Analysis of Targeted Mouse Movements for Gender Classification., , и . EAI Endorsed Trans. Security Safety, 4 (11): e3 (2017)A Behavioral Biometrics Based Approach to Online Gender Classification., , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 475-495. Springer, (2016)Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending., , , , и . IEEE Trans. Inf. Forensics Secur., 12 (1): 144-156 (2017)Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks., , и . BROADNETS, IEEE, (2006)Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks., и . IEEE Trans. Wirel. Commun., 13 (9): 5223-5236 (2014)