From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effectively auditing IaaS cloud servers., , , и . GLOBECOM, стр. 682-688. IEEE, (2013)A Server-Based Non-Intrusive Measurement Infrastructure for Enterprise Networks., , , и . Perform. Evaluation, 36-37 (1-4): 233-247 (1999)A traceback attack on Freenet., , , и . INFOCOM, стр. 1797-1805. IEEE, (2013)Detecting Spam Zombies by Monitoring Outgoing Messages., , , , , и . INFOCOM, стр. 1764-1772. IEEE, (2009)Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance., , , , и . CNS, стр. 1-9. IEEE, (2023)ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data., , , , и . ICCCN, стр. 1-9. IEEE, (2016)Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems., , , , , , и . IEEE Access, (2018)A Routing Table Insertion (RTI) Attack on Freenet., , , и . CyberSecurity, стр. 8-15. IEEE Computer Society, (2012)A new rumor propagation model and control strategy on social networks., , , и . ASONAM, стр. 1472-1473. ACM, (2013)DMTP: Controlling Spam Through Message Delivery Differentiation., , и . Networking, том 3976 из Lecture Notes in Computer Science, стр. 355-367. Springer, (2006)