From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hybrid feature selection technique for intrusion detection system., , и . IJHPCN, 13 (2): 232-240 (2019)A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape., , , , и . CoRR, (2019)Preparing computing students for culturally diverse e-mediated IT projects., , , и . Interact. Technol. Smart Educ., 3 (3): 185-195 (2006)Prediction of Malignant Melanoma Incidence., и . Modelling and Simulation, стр. 234-239. IASTED/ACTA Press, (2003)Privacy Challenges With Protecting Live Vehicular Location Context., , , , и . IEEE Access, (2020)Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain., , , , и . IEEE Trans. Ind. Informatics, 18 (2): 1359-1366 (2022)Forecasts on Future Evolution of Artificial Intelligence and Intelligent Systems., , , и . IEEE Access, (2022)Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms., , , , и . IEEE Access, (2022)A privacy-preserving route planning scheme for the Internet of Vehicles., , , и . Ad Hoc Networks, (2021)Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution., , , и . IET Quantum Commun., 4 (4): 191-199 (декабря 2023)