From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic generation of structured hyperdocuments from document images., , , , и . Pattern Recognit., 35 (2): 485-503 (2002)A 2-D HMM Method for Offline Handwritten Character Recognition., , , и . IJPRAI, 15 (1): 91-105 (2001)A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model., , , , , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 190-200. Springer, (2008)An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants., , , , и . J. Supercomput., 74 (3): 1378-1393 (2018)A new approach to deploying private mobile network exploits., и . J. Supercomput., 72 (1): 46-57 (2016)Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection., , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 25-34. Springer, (2005)SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing., , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2005)Visualization of network components for attack analysis., , , и . CICS, стр. 1-8. IEEE, (2009)Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards., , , , и . Int. J. Distributed Sens. Networks, (2014)Applying genetic algorithm for classifying anomalous TCP/IP packets., , и . Neurocomputing, 69 (16-18): 2429-2433 (2006)