From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on Static Analysis and Model Checking., , , и . SOCO-CISIS-ICEUTE, том 299 из Advances in Intelligent Systems and Computing, стр. 443-452. Springer, (2014)Service Authentication via Electronic Identification Cards: VoIP Service Authentication through the DNIe., и . SRII Global Conference, стр. 602-607. IEEE Computer Society, (2012)Let's do it right the first time: Survey on security concerns in the way to quantum software engineering., , , , , , , , и . Neurocomputing, (июня 2023)Detecting malicious Android applications based on the network packets generated., , , , и . Neurocomputing, (2021)Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems., , , , , и . Neurocomputing, (2019)Anomaly-based user comments detection in social news websites using troll user comments as normality representation., , , , и . Log. J. IGPL, 24 (6): 883-898 (2016)MADS: Malicious Android Applications Detection through String Analysis., , , , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 178-191. Springer, (2013)PUMA: Permission Usage to Detect Malware in Android., , , , , и . CISIS/ICEUTE/SOCO Special Sessions, том 189 из Advances in Intelligent Systems and Computing, стр. 289-298. Springer, (2012)A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic Spaces., , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 1080-1087. IEEE, (2023)Enhancing scalability in anomaly-based email spam filtering., , , , и . CEAS, стр. 13-22. ACM, (2011)