From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting., , , и . Sensors, 18 (4): 1185 (2018)EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks., , и . EURASIP J. Wireless Comm. and Networking, (2011)On the application of digital forensics in different scenarios., , , , и . SADFE, стр. 1-5. IEEE, (2013)A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs., , , , , , и . Future Internet, 11 (3): 61 (2019)Survey of access control models and technologies for cloud computing., , , , , и . Clust. Comput., 22 (Supplement): 6111-6122 (2019)Identification of the source camera of images based on convolutional neural network., , , , , и . Digit. Investig., (2018)Dynamic trust evaluation in open networks., , , , , , и . Intell. Autom. Soft Comput., 22 (4): 631-638 (2016)Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets., , , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101820 (декабря 2023)Privacy Disclosure in the Real World: An Experimental Study., , , , и . Int. J. Inf. Secur. Priv., 16 (1): 1-22 (2022)Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading., , , , , , и . IEEE Internet Things J., 6 (3): 4176-4187 (2019)