From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective Key Management in Dynamic Wireless Sensor Networks., , , и . IEEE Trans. Inf. Forensics Secur., 10 (2): 371-383 (2015)IdentiDroid: Android can finally Wear its Anonymous Suit., , , и . Trans. Data Priv., 7 (1): 27-50 (2014)Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., и . Trans. Data Priv., 2 (1): 1-2 (2009)Detecting mobile malware threats to homeland security through static analysis., , , , и . J. Netw. Comput. Appl., (2014)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , и . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)Hiding Association Rules by Using Confidence and Support., , , и . Information Hiding, том 2137 из Lecture Notes in Computer Science, стр. 369-383. Springer, (2001)Crypto-Chain: A Relay Resilience Framework for Smart Vehicles., , , и . ACSAC, стр. 439-454. ACM, (2021)Self-tuning query mesh for adaptive multi-route query processing., , и . EDBT, том 360 из ACM International Conference Proceeding Series, стр. 803-814. ACM, (2009)Detection of Temporal Insider Threats to Relational Databases., и . CIC, стр. 406-415. IEEE Computer Society, (2017)Detection of Temporal Data Ex-Filtration Threats to Relational Databases., и . CIC, стр. 146-155. IEEE Computer Society, (2018)