From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Aware System-on-a-Chip Design with Uncertainty Classification., , , , и . ICESS, стр. 527-531. IEEE Computer Society, (2008)Theoretical Research Project vs. Hands-on Project in a Network Management Course., и . SIGITE, стр. 145-148. ACM, (2015)Developing and Evaluating an Experimental Learning Environment for Cyber Security Education., и . SIGITE, стр. 92-97. ACM, (2018)Integration and Implementation of Secured IP Based Surveillance Networks., , , и . APSCC, стр. 117-122. IEEE Computer Society, (2008)Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises?, , , , и . BigDataSecurity/HPSC/IDS, стр. 310-320. IEEE, (2019)Course Design and Project Evaluation of a Network Management Course Implemented in On-Campus and Online Classes.. Int. J. Online Pedagog. Course Des., 8 (2): 44-56 (2018)Soft parallel interference cancellation for a turbo coded uplink MC-CDMA system., , , и . WTS, стр. 145-150. IEEE, (2008)Cybersecurity Competitive Labs-as-a-Service: Automated Score and Message Board Design., , и . SIGITE, стр. 148. ACM, (2018)Ensemble of Machine Learning Algorithms for Intrusion Detection., , , и . SMC, стр. 3976-3980. IEEE, (2009)Hybrid Classifier Systems for Intrusion Detection., и . CNSR, стр. 286-291. IEEE Computer Society, (2009)