From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs., , , , , , и . Future Internet, 11 (3): 61 (2019)Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting., , , и . Sensors, 18 (4): 1185 (2018)On the application of digital forensics in different scenarios., , , , и . SADFE, стр. 1-5. IEEE, (2013)Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets., , , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101820 (декабря 2023)Security enhancement technologies for smart contracts in the blockchain: A survey., , , , , , и . Trans. Emerg. Telecommun. Technol., (2021)A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks., , и . J. Networks, 7 (2): 267-274 (2012)Survey of access control models and technologies for cloud computing., , , , , и . Clust. Comput., 22 (Supplement): 6111-6122 (2019)Identification of the source camera of images based on convolutional neural network., , , , , и . Digit. Investig., (2018)Privacy Disclosure in the Real World: An Experimental Study., , , , и . Int. J. Inf. Secur. Priv., 16 (1): 1-22 (2022)Dynamic trust evaluation in open networks., , , , , , и . Intell. Autom. Soft Comput., 22 (4): 631-638 (2016)