From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Botnet homology method based on symbolic approximation algorithm of communication characteristic curve., , , и . AVSS, стр. 1-6. IEEE, (2018)Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence., , , , , , и . DSC, стр. 445-449. IEEE, (2021)Shock Trap: An active defense architecture based on trap vulnerabilities., , , , , и . DSC, стр. 24-31. IEEE, (2022)InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack., , и . USENIX Security Symposium, стр. 2027-2041. USENIX Association, (2023)Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model., и . MSN, стр. 195-200. IEEE Computer Society, (2014)Detection of Android Malicious Apps Based on the Sensitive Behaviors., , , и . TrustCom, стр. 877-883. IEEE Computer Society, (2014)Design of Mobile Botnet Based on Open Service., , , , и . Int. J. Digit. Crime Forensics, 8 (3): 1-10 (2016)Digraph Spectral Clustering with Applications in Distributed Sensor Validation., , и . IJDSN, (2014)Network Intrusion Detection Based on Neural Networks and D-S Evidence., , , и . PSIVT Workshops, том 9555 из Lecture Notes in Computer Science, стр. 332-343. Springer, (2015)Research Notes: User Influence in Microblog Based on Interest Graph., , , и . Int. J. Softw. Eng. Knowl. Eng., 28 (2): 207-218 (2018)