From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information., , и . CANDARW, стр. 253-259. IEEE, (2023)Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor., и . IoTSMS, стр. 393-398. IEEE, (2019)Energy Reduction of BTB by Focusing on Number of Branches per Cache Line., , и . J. Inf. Process., 24 (3): 492-503 (2016)Summarization of Investment Reports Using Pre-trained Model., , , , и . IIAI-AAI, стр. 554-559. IEEE, (2023)Environmental Modeling for Motion-Copying System Using Element Description Method., и . IECON, стр. 1-6. IEEE, (2022)Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT., , и . CANDARW, стр. 288-294. IEEE, (2022)Impact Analysis of Social Events on Industries through Narrative Causal Search., , и . IEEE Big Data, стр. 2845-2854. IEEE, (2023)A preactivating mechanism for a VT-CMOS cache using address prediction., , , , и . ISLPED, стр. 247-250. ACM, (2002)Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor., и . CSR, стр. 323-330. IEEE, (2022)BTB Energy Reduction by Focusing on Useless Accesses., , , , и . IEICE Trans. Electron., 98-C (7): 569-579 (2015)