Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method of Operative Search of Solder Joints During Printed Circuit Boards Development., , , , , , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 1030-1041. CEUR-WS.org, (2019)The monitoring system of DoS/DDoS attacks in the global network., , , and . IDAACS (2), page 791-794. IEEE, (2011)978-1-4577-1426-9.Structural statistic method identifying facial images by contour characteristic points., , , , , and . IDAACS, page 293-297. IEEE, (2015)Security network interface for alarm systems., , , , and . Comput. Stand. Interfaces, 34 (6): 468-475 (2012)Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based Systems., , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 267-276. CEUR-WS.org, (2020)Optimization Methods on the Wavelet Transformation Base for Technical Diagnostic Information Systems., , , , , , , and . IDAACS, page 767-773. IEEE, (2021)Adaptive model of fermentation processes under uncertainty conditions., , , and . IDAACS, page 115-119. IEEE, (2013)Criteria to estimate quality of methods selecting contour inflection points., , , , , and . IDAACS, page 969-973. IEEE, (2017)Assessment of probabilistic parameters of alarm security detectors taking uncertain noise into account., , , , and . IDAACS (2), page 717-721. IEEE, (2011)978-1-4577-1426-9.Analysis of Objects Classification Approaches Using Vectors of Inflection Points., , , , , , , and . ISDMCI, volume 1020 of Advances in Intelligent Systems and Computing, page 148-157. Springer, (2019)