From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalability of Correlation Clustering Through Constraint Reduction., , и . CODS, стр. 1-10. ACM, (2014)Modular approach for anomaly based NIDS., и . COMSWARE, стр. 1-6. IEEE, (2006)Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , и . ICDCIT, том 7753 из Lecture Notes in Computer Science, стр. 220-231. Springer, (2013)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , и . AST/UCMA/ISA/ACN, том 6059 из Lecture Notes in Computer Science, стр. 129-142. Springer, (2010)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 166-178. Springer, (2018)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , и . SocProS (2), том 131 из Advances in Intelligent and Soft Computing, стр. 305-315. Springer, (2011)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , и . ICDCIT, том 11319 из Lecture Notes in Computer Science, стр. 422-439. Springer, (2019)DisTree: A scheme for DHT., и . ICACCI, стр. 794-799. IEEE, (2013)Accuracy enhancement of equal segment based approximate adders., , и . IET Comput. Digit. Tech., 12 (5): 206-215 (2018)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , и . SIN, стр. 111-118. ACM, (2011)