From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems., и . Comput. J., 34 (6): 503-513 (1991)Replication Schemes in Unattended Wireless Sensor Networks., , и . NTMS, стр. 1-5. IEEE, (2011)Obfuscation of sensitive data in network flows., , , , и . INFOCOM, стр. 2372-2380. IEEE, (2012)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)Flexible Commit Protocols for Advanced Transaction Processing., , , и . Advanced Transaction Models and Architectures, (1997)Data Security in Unattended Wireless Sensor Networks., , , , и . IEEE Trans. Computers, 58 (11): 1500-1511 (2009)Minerva: A File-Based Ransomware Detector., , , , и . CoRR, (2023)Reliable detection of compressed and encrypted data., , , , и . Neural Comput. Appl., 34 (22): 20379-20393 (2022)Collecting garbage in multilevel secure object stores., , и . S&P, стр. 106-120. IEEE Computer Society, (1994)