From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A novel approach for analysis of attack graph., , , и . ISI, стр. 7-12. IEEE, (2017)Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS)., , , , и . IEEE Access, (2024)Enhancing Security Awareness Through Gamified Approaches., , , , , и . CoRR, (2024)Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution., , , и . Comput., 13 (7): 163 (июля 2024)An Adversarial Attack Detection Paradigm With Swarm Optimization., , , , и . IJCNN, стр. 1-7. IEEE, (2020)A Reinforcement Learning Approach for Attack Graph Analysis., , , и . TrustCom/BigDataSE, стр. 212-217. IEEE, (2018)An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm., , , , и . Comput., 9 (3): 58 (2020)Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan Environment., , , , и . UCET, стр. 1-4. IEEE, (2020)RTMCH: real-time multichannel MAC for wireless video sensor networks., , и . Multimedia Tools Appl., 78 (6): 7803-7818 (2019)A Practical Approach to Tracking Estimation Using Object Trajectory Linearization., , , и . Int. J. Comput. Intell. Syst., 17 (1): 175 (декабря 2024)