From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defense Strategy of Network Security based on Dynamic Classification., , , , и . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)Autoencoder ensembles for network intrusion detection., , , , , и . ICACT, стр. 323-333. IEEE, (2022)Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems., , , и . IJDSN, 12 (1): 1894713:1-1894713:11 (2016)A Hybrid Intrusion Detection Algorithm Based on Gaussian Mixture Model and Nearest Neighbors., , , , , и . LCN, стр. 117-120. IEEE, (2019)Block pulse operational matrix method for solving fractional partial differential equation., , и . Appl. Math. Comput., (2013)An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation., , , , , и . ICEIS (2), стр. 221-228. SciTePress, (2019)An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing., , , и . Concurr. Comput. Pract. Exp., (2020)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud., , , , и . Concurr. Comput. Pract. Exp., 28 (6): 1930-1945 (2016)