From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , и . CoRR, (2018)An overview of Fog computing and its security issues., , , и . Concurr. Comput. Pract. Exp., 28 (10): 2991-3005 (2016)Modeling worms propagation on probability., , и . NSS, стр. 49-56. IEEE, (2011)Following Targets for Mobile Tracking in Wireless Sensor Networks., , , , , , и . ACM Trans. Sens. Networks, 12 (4): 31:1-31:24 (2016)Intersection Traffic Prediction Using Decision Tree Models., , , и . Symmetry, 10 (9): 386 (2018)Event detection in online social network: Methodologies, state-of-art, and evolution., , , , , , и . Comput. Sci. Rev., (2022)Static Detection of File Access Control Vulnerabilities on Windows System., , , , , и . Concurr. Comput. Pract. Exp., (2022)The structure of communities in scale-free networks., , , , , и . Concurr. Comput. Pract. Exp., (2017)Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification., , , , , и . IEEE Trans. Cloud Comput., 11 (3): 2631-2645 (июля 2023)The Microcosmic Model of Worm Propagation., , , , и . Comput. J., 54 (10): 1700-1720 (2011)