From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An approach for failure recognition in IP-based industrial control networks and systems., , , и . Int. J. Netw. Manag., 22 (6): 477-493 (2012)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , и . Secur. Commun. Networks, (2017)Experimental Comparison of Machine Learning Models in Malware Packing Detection., , , и . APNOMS, стр. 377-380. IEEE, (2020)Applicaion-level traffic analysis of smartphone users using embedded agents., и . APNOMS, стр. 1-4. IEEE, (2012)Android malware detection using multivariate time-series technique., и . APNOMS, стр. 198-202. IEEE, (2015)A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP., , , , и . APNOMS, стр. 487-490. IEEE, (2015)Autonomic Resilient Internet-of-Things(IoT)Management., , и . CoRR, (2015)Towards Management Requirements of Future Internet., , , , и . APNOMS, том 5297 из Lecture Notes in Computer Science, стр. 156-166. Springer, (2008)Automatic Configuration for VPN Using Active XML., и . IPOM, том 3751 из Lecture Notes in Computer Science, стр. 173-180. Springer, (2005)OMA DM-based remote software fault management for mobile devices., , , , и . Int. J. Netw. Manag., 19 (6): 491-511 (2009)