From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures., , и . CAMAD, стр. 1-6. IEEE, (2020)Botnet Attack Detection at the IoT Edge Based on Sparse Representation., , и . GIoTS, стр. 1-6. IEEE, (2019)Network Topology Effects on the Detectability of Crossfire Attacks., и . IEEE Trans. Inf. Forensics Secur., 13 (7): 1682-1695 (2018)D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks., , , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 663-678. Springer, (2010)On Using Reliable Network RAM in Networks of Workstations., , , , , и . Scalable Computing: Practice and Experience, (1999)New Advances on Privacy-Preserving Policy Reconciliation., , и . IACR Cryptology ePrint Archive, (2010)A Novel Protocol for Network-Controlled Metasurfaces., , , и . CoRR, (2018)A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless Systems., , , , , и . CoRR, (2018)CORONA: A Coordinate and Routing system for Nanonetworks., , , и . NANOCOM, стр. 18:1-18:6. ACM, (2015)AndRadar: Fast Discovery of Android Applications in Alternative Markets., , , , , , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 51-71. Springer, (2014)