From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lies and the lying liars that tell them: a fair and balanced look at TLS., и . CSIIRW, стр. 59. ACM, (2010)Security and performance evaluation of security protocols., , , и . CSIIRW, стр. 2. ACM, (2013)A Model for Mobile Code Using Interacting Automata., и . IEEE Trans. Mob. Comput., 1 (4): 313-326 (2002)Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion., , , , , и . FUSION, стр. 2376-2383. IEEE, (2018)Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks., и . IJDSN, 5 (5): 480-501 (2009)Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering., , , и . GLOBECOM, стр. 2952-2956. IEEE, (2003)Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms., , и . Artif. Intell., 84 (1-2): 339-354 (1996)Symmetric encryption in reconfigurable and custom hardware., , , , и . Int. J. Embed. Syst., 1 (3/4): 205-217 (2005)Resolution of Contradictory Sensor Data., , и . Intell. Autom. Soft Comput., 3 (3): 287-299 (1997)Distributed Denial of Service (DDoS): A History., , , , и . IEEE Ann. Hist. Comput., 44 (2): 44-54 (2022)