From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-failure restoration with minimal flow operations in software defined networks., и . DRCN, стр. 263-266. IEEE, (2015)Heuristic algorithms for designing self-repairing protection trees in mesh networks., и . Comput. Networks, 53 (14): 2537-2551 (2009)Analyzing the Quality of Synthetic Adversarial Cyberattacks., , , и . CNSM, стр. 1-5. IEEE, (2023)Proactive risk mitigation for communication network resilience in disaster scenarios., и . WoWMoM, стр. 1-4. IEEE Computer Society, (2014)Automated Geospatial Approach for Assessing SDG Indicator 11.3.1: A Multi-Level Evaluation of Urban Land Use Expansion across Africa., , , , , и . ISPRS Int. J. Geo Inf., 13 (7): 226 (2024)A self-healing approach for LTE Evolved Packet Core., и . CCECE, стр. 1-5. IEEE, (2012)Building an Intrusion Detection System to Detect Atypical Cyberattack Flows., , , и . IEEE Access, (2021)Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey., , , и . IEEE Trans. Netw. Serv. Manag., 21 (1): 1190-1212 (февраля 2024)Network survivability in large-scale regional failure scenarios., и . C3S2E, стр. 83-87. ACM, (2009)Lightweight reliable overlay multicasting in large-scale P2P networks., и . C3S2E, стр. 10-16. ACM, (2010)