From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visual representation of penetration testing actions and skills in a technical tree model., , и . ACSW, стр. 8:1-8:10. ACM, (2017)Modified Tensor Locality Preserving Projection for Dimensionality Reduction of Hyperspectral Images., , , , , и . IEEE Geosci. Remote. Sens. Lett., 15 (2): 277-281 (2018)Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks., , , , и . ACM Trans. Multim. Comput. Commun. Appl., 18 (3): 86:1-86:23 (2022)Multiscale Adjacent Superpixel-Based Extended Multi-Attribute Profiles Embedded Multiple Kernel Learning Method for Hyperspectral Classification., , , и . Remote. Sens., 13 (1): 50 (2021)Toward Incremental Parallelization Using Navigational Programming., , , , , , и . IEICE Trans. Inf. Syst., 89-D (2): 390-398 (2006)L1 Adaptive Output Feedback Controller with Operating Constraints for Solid Oxide Fuel Cells., , и . ICINCO (1), стр. 499-507. SciTePress, (2014)Portguard - an authentication tool for securing ports in an IoT gateway., , , и . PerCom Workshops, стр. 624-629. IEEE, (2017)Robust Correctness Testing for Digital Forensic Tools., и . e-Forensics, том 8 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 54-64. Springer, (2009)Security analysis of modern mission critical android mobile applications., , и . ACSW, стр. 2:1-2:9. ACM, (2017)Investigating Security Vulnerabilities in Modern Vehicle Systems., , , и . ATIS, том 651 из Communications in Computer and Information Science, стр. 29-40. (2016)