From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method for evaluating the consequence propagation of security attacks in cyber-physical systems., и . Future Gener. Comput. Syst., (2017)A Taxonomy of Frauds and Fraud Detection Techniques., и . ICISTM, том 31 из Communications in Computer and Information Science, стр. 256-267. Springer, (2009)A distributed multi-approach intrusion detection system for web services., и . SIN, стр. 238-244. ACM, (2010)Efficient Evaluation of CSAN Models by State Space Analysis Methods., и . ICSEA, стр. 57. IEEE Computer Society, (2006)A method for intrusion detection in web services based on time series., , и . CCECE, стр. 836-841. IEEE, (2015)A Computational Trust Model for E-Commerce Systems., и . DigiBiz, том 21 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 9-18. Springer, (2009)Towards a Trust-Based Model for Administration of Mailing Lists., и . GLOBECOM, стр. 5558-5563. IEEE, (2008)Unified power and performance analysis of cloud computing infrastructure using stochastic reward nets., , и . Comput. Commun., (2019)A hybrid fraud scoring and spike detection technique in streaming data., и . Intell. Data Anal., 14 (6): 773-800 (2010)A Model of Trust Based on Uncertainty Theory., , и . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 26 (2): 269-298 (2018)