From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An OWL-Based Approach for RBAC with Negative Authorization., , , , и . KSEM, том 4092 из Lecture Notes in Computer Science, стр. 164-175. Springer, (2006)An Indoor Wi-Fi Positioning Approach optimized by Virtual Node., , и . ICCCS, стр. 609-612. IEEE, (2020)A Flexible Applicable RBAC Model and Its Administration., , и . DEXA Workshops, стр. 192-196. IEEE Computer Society, (2007)Specific primary user sensing for wireless security in IEEE 802.22 network., , , , и . ISCIT, стр. 18-22. IEEE, (2011)Energy-based target localization in multi-hop wireless sensor networks., и . RWS, стр. 243-246. IEEE, (2012)Survey of sensor selection methods in wireless sensor networks., и . ICON, стр. 1-5. IEEE, (2013)Web Application Security Gateway with Java Non-blocking IO., , , , и . NGITS, том 4032 из Lecture Notes in Computer Science, стр. 96-105. Springer, (2006)Intrusion detection in wireless sensor networks for destructive intruders., , и . APSIPA, стр. 68-75. IEEE, (2015)An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems., , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2015)Data Link Modeling and Simulation Based on DEVS., , , , , , и . SPML, стр. 35-40. ACM, (2019)