From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of attack and defense techniques for reputation systems., , и . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)A platform for creating efficient, robust, and resilient peer-to-peer systems. Purdue University, USA, (2010)Experimental comparison of peer-to-peer streaming overlays: An application perspective., , , и . LCN, стр. 20-27. IEEE Computer Society, (2008)A Marauder's Map for the IoT Edge., , , и . CIC, стр. 236-245. IEEE, (2019)A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks., , и . IEEE/ACM Trans. Netw., 16 (6): 1434-1446 (2008)Improving supply chain security using big data., , и . ISI, стр. 254-259. IEEE, (2013)An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds., , , , , и . ICDCS, стр. 1717-1728. IEEE Computer Society, (2017)Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions., , , , и . ICNC, стр. 637-641. IEEE Computer Society, (2013)A Network-Aware Distributed Membership Protocol for Collaborative Defense., , и . CSE (4), стр. 1123-1130. IEEE Computer Society, (2009)Tracking Network Events with Write Optimized Data Structures., , , , , и . BADGERS@RAID, стр. 1-7. IEEE, (2015)