From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ISEK: An Information Security Knowledge Graph for CISP Knowledge System., , , , и . ICITCS, стр. 1-4. IEEE Computer Society, (2015)An attack pattern mining algorithm based on fuzzy logic and sequence pattern., , , , , и . CCIS, стр. 234-238. IEEE, (2016)An Android malware detection method based on AndroidManifest file., , , , и . CCIS, стр. 239-243. IEEE, (2016)Phishing sites detection based on Url Correlation., , , , , и . CCIS, стр. 244-248. IEEE, (2016)An Improved Fuzzy Test of Industrial Control System., , , и . ICCAE, стр. 233-237. ACM, (2018)Research on Ontology-Based Multi-source Engineering Information Retrieval in Integrated Environment of Enterprise., , и . IESA, стр. 277-282. IEEE Computer Society, (2009)Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems., , и . WAIM (1), том 9658 из Lecture Notes in Computer Science, стр. 231-243. Springer, (2016)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)JTOWL: A JSON to OWL Converto., , и . Web-KRM@CIKM, стр. 13-14. ACM, (2014)