From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of the constrained application protocol in the Internet of Things., , и . FGCT, стр. 163-168. IEEE, (2013)Intrusion Detection and Classification with Autoencoded Deep Neural Network., , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 142-156. Springer, (2018)Continuous User Authentication Based on Deep Neural Networks., , и . UCET, стр. 1-4. IEEE, (2020)On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network., , , и . FGCT, стр. 213-218. IEEE, (2013)Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication., , и . CSS (2), том 11983 из Lecture Notes in Computer Science, стр. 448-461. Springer, (2019)6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach., , , , и . Int. J. Commun. Syst., 25 (9): 1189-1212 (2012)A security framework for node-to-node communications based on the LISP architecture., , , и . Int. J. Electron. Secur. Digit. Forensics, 10 (3): 276-291 (2018)Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular Network., , , и . AINA Workshops, стр. 900-904. IEEE Computer Society, (2014)A Secure Framework for Communications in Heterogeneous Networks., , , и . AINA Workshops, стр. 841-846. IEEE Computer Society, (2014)A Formally Verified Device Authentication Protocol Using Casper/FDR., , , , и . TrustCom, стр. 1293-1298. IEEE Computer Society, (2012)