From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Method for Combating Malicious Scripts Clickbots., , , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 523-538. Springer, (2009)A Virtual Sample Generation Method Based on Differential Evolution Algorithm for Overall Trend of Small Sample Data: Used for Lithium-ion Battery Capacity Degradation Data., , , и . IEEE Access, (2019)A Graph-Based Investigation of Bitcoin Transactions., и . IFIP Int. Conf. Digital Forensics, том 462 из IFIP Advances in Information and Communication Technology, стр. 79-95. Springer, (2015)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , и . APSEC, стр. 355-362. IEEE, (2019)Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization., , , , , и . HPCC/CSS/ICESS, стр. 1031-1036. IEEE, (2015)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , и . Comput. Commun., 28 (14): 1618-1630 (2005)A robust group-based key management scheme for wireless sensor networks., и . WCNC, стр. 1915-1920. IEEE, (2005)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., и . SADFE, стр. 1-7. IEEE, (2013)A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery., и . IFIP Int. Conf. Digital Forensics, том 194 из IFIP, стр. 79-90. Springer, (2005)LogExtractor: Extracting digital evidence from android log messages via string and taint analysis., , , и . Digit. Investig., (2021)