From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings., , и . Int. J. Digit. Crime Forensics, 12 (3): 111-121 (2020)A Proposed Three-Dimensional Public Security Prevention and Control System Based on Big-Data., , , , , и . SPIoT (1), том 1282 из Advances in Intelligent Systems and Computing, стр. 320-325. Springer, (2020)Suggestions to digital forensics in Cloud computing ERA., , , и . IC-NIDC, стр. 540-544. IEEE, (2012)An Incremental Acquisition Method for Web Forensics., , , и . Int. J. Digit. Crime Forensics, 13 (6): 1-13 (2021)LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code., , , , и . Trustcom/BigDataSE/ISPA, стр. 996-1000. IEEE, (2016)Reliable Security Strategy for Message-Oriented Middleware., , , и . Int. J. Digit. Crime Forensics, 10 (1): 12-23 (2018)A New Quantitative Evaluation Method for Fuzzing., , , , , , и . ICAIS (2), том 11633 из Lecture Notes in Computer Science, стр. 181-190. Springer, (2019)Research on Threat Information Network Based on Link Prediction., , , , и . Int. J. Digit. Crime Forensics, 13 (2): 94-102 (2021)An Improved Encryption Scheme for Traitor Tracing from Lattice., , , и . Int. J. Digit. Crime Forensics, 10 (4): 21-35 (2018)