From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hiding data in video sequences using steganography algorithms., , , и . ICTC, стр. 353-358. IEEE, (2013)A Novel Scheme for Supporting Location Authentication of Mobile Nodes., , и . MobiSec, том 47 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 91-102. Springer, (2010)A New Secure Binding Management Protocol for Mobile IPv6 Networks., , и . IAS, стр. 281-286. IEEE Computer Society, (2008)A proactive caching and offloading technique using machine learning for mobile edge computing users., , и . Comput. Commun., (2022)Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study., , и . SecNet, том 381 из Communications in Computer and Information Science, стр. 185-195. Springer, (2013)A fast hybrid image cryptosystem based on random generator and modified logistic map., , , и . Multim. Tools Appl., 78 (12): 16177-16193 (2019)A novel deep learning framework for copy-moveforgery detection in images., , , , , , , , , и . Multim. Tools Appl., 79 (27-28): 19167-19192 (2020)Efficient audio cryptosystem based on chaotic maps and double random phase encoding., , , , , , и . Int. J. Speech Technol., 18 (4): 619-631 (2015)Garbage Collection Schemes for Shared Memory Multiprocessors., , и . CATA, стр. 302-307. ISCA, (2004)Using Patch Management Tools to Enhance the Signature Customization for IDS Based on Vulnerability Scanner., , и . ITNG, стр. 529-533. IEEE Computer Society, (2014)