From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Randomness-optimal Steganography, , и . CoRR, (2009)Distributed dynamic channel assignment in wireless networks., , и . ICNC, стр. 1113-1117. IEEE, (2014)Taking total control of voting systems: firmware manipulations on an optical scan voting terminal., , , , , , , , и . SAC, стр. 2049-2053. ACM, (2009)Graphically Display Database Transactions to Enhance Database Forensics., , и . ISDFS, стр. 1-6. IEEE, (2020)Work-Competitive Scheduling on Task Dependency Graphs., , и . Parallel Process. Lett., 25 (2): 1550001:1-1550001:18 (2015)Efficient Steganography with Provable Security Guarantees, , , и . CoRR, (2009)Topic Modeling in the ENRON Dataset., и . BigData, том 13730 из Lecture Notes in Computer Science, стр. 27-34. Springer, (2022)Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals., , и . ISDFS, стр. 1-6. IEEE, (2023)Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools., , , и . ISDFS, стр. 1-10. IEEE, (2022)Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges., , , и . ICNC, стр. 1132-1136. IEEE Computer Society, (2015)