From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , и . Comput. Networks, (2021)A Comprehensive Analysis of Healthcare Websites Usability Features, Testing Techniques and Issues., , , , и . IEEE Access, (2022)BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails., , , , и . IEEE Syst. J., 16 (1): 1367-1378 (2022)Exploring Partitioning Attacks on the Bitcoin Network., , , , и . IEEE/ACM Trans. Netw., 30 (1): 202-214 (2022)SyncAttack: Double-spending in Bitcoin Without Mining Power., , и . CCS, стр. 1668-1685. ACM, (2021)Tackling Imputation Across Time Series Models Using Deep Learning and Ensemble Learning., , , и . SMC, стр. 3084-3090. IEEE, (2020)Evaluation of Imputation Models Based on the Enhancement to Yield Forecasting., , , и . SMC, стр. 3416-3422. IEEE, (2021)Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks., и . SP, стр. 111-125. IEEE, (2023)Countering Selfish Mining in Blockchains., , , и . ICNC, стр. 360-364. IEEE, (2019)Computing the Fourier Transformation over Temporal Data Streams (Invited Talk)., и . TIME, том 147 из LIPIcs, стр. 1:1-1:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)