From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework., , , , и . MILCOM, стр. 926-932. IEEE, (2018)A study of localization metrics: Evaluation of position errors in wireless sensor networks., , и . Comput. Networks, 55 (15): 3562-3577 (2011)Graph Aware Caching Policy for Distributed Graph Stores., , , , и . IC2E, стр. 6-15. IEEE Computer Society, (2015)A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications., , , , и . CoRR, (2018)Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices., , , , , и . ICC, стр. 1-7. IEEE, (2020)Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques., , , и . ICC, стр. 1-6. IEEE, (2018)Identification of Wearable Devices with Bluetooth., , и . IEEE Trans. Sustain. Comput., 6 (2): 221-230 (2021)Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers., , , , и . MASS, стр. 580-584. IEEE Computer Society, (2017)IoT-enabled smart lighting systems for smart cities., , , , , и . CCWC, стр. 639-645. IEEE, (2018)WACA: Wearable-Assisted Continuous Authentication., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 264-269. IEEE Computer Society, (2018)