From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authentication of Underwater Assets., , , и . CoRR, (2022)Design of a neural network for recognition and classification of computer viruses., , , и . Comput. Secur., 14 (5): 435-448 (1995)SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture., , , , , , , , , и 23 other автор(ы). Digit., 1 (4): 173-187 (декабря 2021)Estimation for Linear Systems with Non-Gaussian Initial State: Centralized and Decentralized Partitioning Algorithms., , и . Neural Parallel & Scientific Comp., 6 (4): 479-499 (1998)Towards improving existing online social networks' privacy policies., и . IJIPSI, 3 (3): 209-229 (2018)A Systematic Literature Review on RAMS analysis for critical infrastructures protection., , и . Int. J. Crit. Infrastructure Prot., (2021)Design of a dynamic log management infrastructure using risk and affiliation network analysis., и . PCI, стр. 52-57. ACM, (2018)Designing a seamless privacy policy for social networks., и . Panhellenic Conference on Informatics, стр. 139-143. ACM, (2015)Specifying electronic voting protocols in typed MSR., , и . WPES, стр. 35-39. ACM, (2005)Multivariate AR Model Order Estimation with Unknown Process Order., , и . Panhellenic Conference on Informatics, том 3746 из Lecture Notes in Computer Science, стр. 787-797. Springer, (2005)