From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics., , , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 84-88. IEEE, (2023)Mobile Station Location Based on Hybrid of Signal Strength and Time of Arrival., и . ICMB, стр. 585-591. IEEE Computer Society, (2005)Enhancing Brain Tumour Aid Diagnosis with Augmented Reality rendering-based 6 DoF Object Pose Estimation., , , , , и . ICSPIS, стр. 11-16. IEEE, (2023)Autonomous Building Detection Using Region Properties and PCA., , , , , и . ICSPIS, стр. 1-4. IEEE, (2018)A Study on Seizure Detection Performance in an Automated Process by Extracting Entropy Features., , , , и . ICSPIS, стр. 86-91. IEEE, (2022)SemiSegPolyp: Semi-Supervised Polyp Segmentation using Graph Signals., , , , и . ICECS 2022, стр. 1-4. IEEE, (2022)Security, Trust, and Privacy Management Framework in Cyber-Physical Systems using Blockchain., , , , , и . CCNC, стр. 1-6. IEEE, (2023)Reliability and latency trade-off in time domain interleaving for OFDM communication systems., , , и . MECO, стр. 1-4. IEEE, (2018)Analysis of Distributed Resource Management in Wireless LANs that Support Fault Tolerance., и . Wireless Information Systems, стр. 66-75. INSTICC Press, (2006)Securing the Wireless LANs Against Internal Attacks., и . MSN, том 4864 из Lecture Notes in Computer Science, стр. 814-821. Springer, (2007)