From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low power Gm-boosted differential Colpitts VCO., , , , , и . SoCC, стр. 247-250. IEEE, (2011)Detecting packed executables using steganalysis., , , и . EUVIP, стр. 1-5. IEEE, (2014)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , и . SECRYPT, стр. 327-335. SciTePress, (2016)PageRank in malware categorization., , , и . RACS, стр. 291-295. ACM, (2015)An investigation into the design of high-performance shared buffer architectures based on FPGA technology with embedded memory., и . FPT, стр. 461-464. IEEE, (2004)N-opcode analysis for android malware classification and categorization., , , и . Cyber Security And Protection Of Digital Services, стр. 1-7. IEEE, (2016)A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems., , , , и . ISGT, стр. 1-5. IEEE, (2020)High-Performance random data lookup for network processing., , , и . SoCC, стр. 272-277. IEEE, (2010)Classification of P2P and HTTP Using Specific Protocol Characteristics., , и . EUNICE, том 5733 из Lecture Notes in Computer Science, стр. 31-40. Springer, (2009)Quality of service analysis of a wireless ATM network access point., , , и . ICC, стр. 226-230. IEEE, (1999)