From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An intrusion detection algorithm for wireless networks based on ASDL., , и . IEEE CAA J. Autom. Sinica, 5 (1): 92-107 (2018)A novel type of Automata for dynamic, heterogeneous and random architectures.. CoRR, (2017)基于时序逻辑的3种网络攻击建模 (Modeling for Three Kinds of Network Attacks Based on Temporal Logic)., , , и . 计算机科学, 45 (2): 209-214 (2018)How to find a GSMem malicious activity via an AI approach., , и . CoRR, (2018)Antenna array geometry and coding performance., , , и . ISIT, стр. 1038-1042. IEEE, (2005)Plog: Its algorithms and applications.. Texas Tech University, Lubbock, USA, (2012)base-search.net (fttexastechuniv:oai:ttu-ir.tdl.org:2346/45252).Model Checking for Computation Tree Logic with Past Based on DNA Computing., , , , , и . BIC-TA, том 791 из Communications in Computer and Information Science, стр. 131-147. Springer, (2017)An Open Access Wideband Multi-Antenna Wireless Testbed with Remote Control Capability., , и . TRIDENTCOM, стр. 72-81. IEEE Computer Society, (2005)Remote Sensing Indices for Spatial Monitoring of Agricultural Drought in South Asian Countries., , , , , , , , и . Remote. Sens., 13 (11): 2059 (2021)Model Checking Computational Tree Logic Using Sticker Automata., , , и . BIC-TA (1), том 681 из Communications in Computer and Information Science, стр. 12-20. Springer, (2016)