From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The robustness of interdependent networks under the interplay between cascading failures and virus propagation., , , , и . CoRR, (2016)Network Connections Information Extraction of 64-Bit Windows 7 Memory Images., , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 90-98. Springer, (2010)Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System., , , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 122-130. Springer, (2010)A Malware Detection Approach Based on Deep Learning and Memory Forensics., , , , , и . Symmetry, 15 (3): 758 (февраля 2023)The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude., , , и . Cryptogr. Commun., 12 (4): 675-683 (2020)A lightweight delegated private set intersection cardinality protocol., , , и . Comput. Stand. Interfaces, (января 2024)A reputation-based dynamic reorganization scheme for blockchain network sharding., , , , и . Connect. Sci., (декабря 2024)Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach., , , , и . IEEE Netw., 36 (4): 166-173 (2022)Video forensics research based on authenticity and integrity., , , , и . ICIA, стр. 1223-1226. IEEE, (2016)Algorithm for Agent Collaborative Learning Task Allocation Based Graph Framework., , и . BIFE, стр. 215-218. IEEE Computer Society, (2009)