From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , и . CoRR, (2018)GhostKnight: Breaching Data Integrity via Speculative Execution., , , и . CoRR, (2020)What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text., , , , и . IEEE Trans. Serv. Comput., 13 (3): 584-596 (2020)SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud., , , , , и . Concurr. Comput. Pract. Exp., 25 (18): 2561-2576 (2013)Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs., , , , , , и . IEEE Internet Things J., 9 (14): 12563-12572 (2022)Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs., , , , , и . IEEE Trans. Serv. Comput., 15 (5): 2728-2741 (2022)Scheduling Real-Time Security Aware Tasks in Fog Networks., , , , и . IEEE Trans. Serv. Comput., 14 (6): 1981-1994 (2021)Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability., , , , , и . IEEE Access, (2017)Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm., , , и . IEEE Access, (2021)Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication., , , и . IACR Cryptology ePrint Archive, (2017)