From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things., , , , и . IEEE Internet of Things Journal, 6 (4): 6822-6834 (2019)SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach., , , , , и . Future Internet, 10 (8): 76 (2018)Improving End-System Performance with the Use of the QoS Management., и . ICT, том 3124 из Lecture Notes in Computer Science, стр. 601-606. Springer, (2004)Integrated CAC and scheduling cross-layer algorithms in WiMAX networks with dynamic polling management., и . GLOBECOM Workshops, стр. 134-139. IEEE, (2012)WUSTL-IIOT-2018., , и . (июня 2020)A Real-Time Automatic Plate Recognition System Based on Optical Character Recognition and Wireless Sensor Networks for ITS., , и . Sensors, 20 (1): 55 (2020)Analysis of AeroMACS Data Link for Unmanned Aircraft Vehicles., , и . CoRR, (2019)Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning., , и . CoRR, (2019)A New Queue Length based Scheduling Strategy for nrtPS Service Class in IEEE 802.16 Networks., и . WINSYS, стр. 165-171. SciTePress, (2016)A Proposal of Web Based SNMP Management for Embedded System Applying in Pattern Recognition Using Wavelet Transform., , и . AICT/ICIW, стр. 202. IEEE Computer Society, (2006)