From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance evaluation comparison for detecting DNA structural break through big data analysis., , и . Comput. Syst. Sci. Eng., (2016)A survivability model in wireless sensor networks., , , и . Comput. Math. Appl., 64 (12): 3666-3682 (2012)Digital Signature-Based Secure Communication in Cognitive Radio Networks., и . BWCCA, стр. 230-235. IEEE Computer Society, (2011)Formal Verification of Control Strategies for a Cyber Physical System., , и . ICDCS Workshops, стр. 91-96. IEEE Computer Society, (2017)Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers., , , и . J. King Saud Univ. Comput. Inf. Sci., 32 (10): 1127-1139 (2020)Cognitive radio network security: A survey., , , , , и . J. Netw. Comput. Appl., 35 (6): 1691-1708 (2012)Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey., , , , и . Comput. J., 55 (4): 438 (2012)A methodology to counter DoS attacks in mobile IP communication., , и . Mob. Inf. Syst., 8 (2): 127-152 (2012)Security Challenges for Big Data and IoT., , , , и . BDET, стр. 1-6. ACM, (2020)Optimised Sensor Based Smart System for Efficient Monitoring of Grain Storage., , и . ICC Workshops, стр. 1-6. IEEE, (2018)