From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices., , , и . Int. J. Autom. Comput., 13 (4): 350-363 (2016)Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , и . IEEE Access, (2023)Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles., , , , , и . IEEE Access, (2021)Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs., , , , и . Sensors, 21 (8): 2718 (2021)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , и . VTC Fall, стр. 1-5. IEEE, (2017)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , и . ICAC, стр. 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , и . ICAC, стр. 1-6. IEEE, (2022)Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead., , , и . ICFNDS, стр. 15:1-15:8. ACM, (2017)Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images., , , , , , , и . CoRR, (2022)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , и . ICISDM, стр. 44-48. ACM, (2018)