From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , и . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , и . ISCC, стр. 700-707. IEEE Computer Society, (2015)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., и . ICITST, стр. 1-6. IEEE, (2009)IFS - Intrusion forecasting system based on collaborative architecture., и . ICDIM, стр. 217-222. IEEE, (2009)Communication Middleware to Distributed Multimedia Application on High Speed Multi-service Networks: Design and experiences., , и . IMSA, стр. 294-299. IASTED/ACTA Press, (2002)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , и . Int. J. Sens. Networks, 41 (3): 137-151 (2023)Privacy-preserving cloud-connected IoT data using context-aware and end-to-end secure messages., , , и . FNC/MobiSPC, том 191 из Procedia Computer Science, стр. 25-32. Elsevier, (2021)Applying multi-correlation for improving forecasting in cyber security., , , и . ICDIM, стр. 179-186. IEEE, (2011)Analysis and Implementation of a Pre-defined QoS Specification Methodology for VoD Systems., , , и . IMSA, стр. 406-411. IASTED/ACTA Press, (2001)Evaluation of theora and speex performance in IP videoconferencing., , , и . WebMedia, стр. 135-138. ACM, (2012)