From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge., , , и . CoRR, (2019)Decrypting live SSH traffic in virtual environments., , , и . CoRR, (2019)IoT Forensics: Amazon Echo as a Use Case., , , , и . IEEE Internet of Things Journal, 6 (4): 6487-6497 (2019)Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device., , , и . CoRR, (2019)Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction., , , и . CoRR, (2020)Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0., , , , , , и . CoRR, (2019)Machine learning and semantic analysis of in-game chat for cyberbullying., , , и . CoRR, (2019)Decentralized Accessibility of e-commerce Products through Blockchain Technology., , , , , , и . CoRR, (2020)Correlation between academic and skills-based tests in computer networks.. Br. J. Educ. Technol., 37 (1): 69-78 (2006)A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder., , , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 128:1-128:21 (2023)