From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization., , , , , и . HPCC/CSS/ICESS, стр. 1031-1036. IEEE, (2015)A Dynamic Neural Network Approach for Efficient Control of Manipulators., , и . IEEE Trans. Syst. Man Cybern. Syst., 49 (5): 932-941 (2019)Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy., и . SADFE, стр. 38-45. IEEE, (2020)A Graph-Based Investigation of Bitcoin Transactions., и . IFIP Int. Conf. Digital Forensics, том 462 из IFIP Advances in Information and Communication Technology, стр. 79-95. Springer, (2015)An Effective Method for Combating Malicious Scripts Clickbots., , , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 523-538. Springer, (2009)Fuzzy Adaptive Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Unknown Control Directions., , , и . Int. J. Fuzzy Syst., 21 (7): 2066-2076 (2019)PeerCredential: a reputation-based trust framework for Peer-to-Peer applications., , и . Int. J. Inf. Comput. Secur., 1 (3): 256-277 (2007)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., и . SADFE, стр. 1-7. IEEE, (2013)A robust group-based key management scheme for wireless sensor networks., и . WCNC, стр. 1915-1920. IEEE, (2005)Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4., , , , и . Intelligent Information Processing, том 432 из IFIP Advances in Information and Communication Technology, стр. 178-186. Springer, (2014)