From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust Host Anomaly Detector Using Strong Isolation., и . CSSE (3), стр. 575-578. IEEE Computer Society, (2008)978-0-7695-3336-0.An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks., , , и . Int. J. Distributed Sens. Networks, (2014)Trustworthy Web Service Security Risk Assessment Research., и . IFITA (3), стр. 417-420. IEEE Computer Society, (2009)Anomaly detection of privileged program based on fuzzy segments., , и . ISADS, стр. 580-584. IEEE Computer Society, (2005)Web Application Security Based on Trusted Network Connection., и . WISM (2), том 6988 из Lecture Notes in Computer Science, стр. 420-427. Springer, (2011)Program Detection with Context Dependency for Collaborative Services., и . CSCWD, стр. 48-53. IEEE, (2006)Anomaly Detection with High Deviations for System Security., и . PRDC, стр. 200-207. IEEE Computer Society, (2005)Model of Trusted Dynamic Measurement Based on System Calls., , и . WISM (3), том 238 из Communications in Computer and Information Science, стр. 238-241. Springer, (2011)The Research and Implementation of Heterogeneous Data Integration under Ontology Mapping Mechanism., , и . WISM (2), том 6988 из Lecture Notes in Computer Science, стр. 87-94. Springer, (2011)Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment., и . 3PGCIC, стр. 316-320. IEEE, (2013)