From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology., , , , и . IEEE Access, (2019)Gathering Intelligence on Student Information Behavior Using Data Mining., , , , , , , , и . Libr. Trends, 68 (4): 636-658 (2020)Deep learning algorithms for cyber security applications: A survey., , , , , и . J. Comput. Secur., 29 (5): 447-471 (2021)Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments., , и . TrustCom, стр. 177-184. IEEE Computer Society, (2012)Visualization of big data security: a case study on the KDD99 cup data set., , , , и . Digit. Commun. Networks, 3 (4): 250-259 (2017)A cyber-threat analytic model for autonomous detection of virtual property theft., , и . Inf. Comput. Secur., 25 (4): 358-381 (2017)Virtual World Security Inspection., и . J. Networks, 7 (6): 895-907 (2012)An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks., , , , , и . FNSS, том 1113 из Communications in Computer and Information Science, стр. 52-64. Springer, (2019)A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds., и . HCC, том 328 из IFIP Advances in Information and Communication Technology, стр. 161-171. Springer, (2010)A Direct Insight into Victims of Cybercrime., , и . TrustCom/ISPA/IUCC, стр. 603-610. IEEE Computer Society, (2013)