From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Load Balance and Trajectory Design in Multi-UAV Aided Large-Scale Wireless Rechargeable Networks., , , и . IEEE Trans. Veh. Technol., 69 (11): 13756-13767 (2020)Indoor static localization based on Fresnel zones model using COTS Wi-Fi., , , и . J. Netw. Comput. Appl., (2020)An Enhanced Virtual Force Algorithm for Diverse k-Coverage Deployment of 3D Underwater Wireless Sensor Networks., , , , , и . Sensors, 19 (16): 3496 (2019)Analyzing Android Application in Real-Time at Kernel Level., , , , и . ICCCN, стр. 1-9. IEEE, (2017)Correlating processes for automatic memory evidence analysis., , , , , и . INFOCOM Workshops, стр. 115-120. IEEE, (2015)A shared memory based cross-VM side channel attacks in IaaS cloud., , , , и . INFOCOM Workshops, стр. 181-186. IEEE, (2016)A lightweight live memory forensic approach based on hardware virtualization., , , , и . Inf. Sci., (2017)Indoor Navigation With Virtual Graph Representation: Exploiting Peak Intensities of Unmodulated Luminaries., , , , , , и . IEEE/ACM Trans. Netw., 27 (1): 187-200 (2019)IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT., , , и . World Wide Web, 21 (1): 59-88 (2018)A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment., , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)