From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , и . Comput. Networks, (2021)QOI: Assessing Participation in Threat Information Sharing., , , , , , и . ICASSP, стр. 6951-6955. IEEE, (2018)Graph-Based Comparison of IoT and Android Malware., , , , , и . CSoNet, том 11280 из Lecture Notes in Computer Science, стр. 259-272. Springer, (2018)Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization., , , , , и . IEEE Trans. Computers, 73 (1): 192-205 (января 2024)Futuristic Decentralized Vehicular Network Architecture and Repairing Management System on Blockchain., , , и . IEEE Internet Things J., 11 (13): 23604-23616 (июля 2024)Analysis of Tree-Family Machine Learning Techniques for Risk Prediction in Software Requirements., , , , , и . IEEE Access, (2022)Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems., , , , , и . ICDCS, стр. 1296-1305. IEEE, (2019)IoT malware ecosystem in the wild: a glimpse into analysis and exposures., , , , , и . SEC, стр. 413-418. ACM, (2019)Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection., , , , , и . ICICS, том 12282 из Lecture Notes in Computer Science, стр. 443-461. Springer, (2020)Analyzing endpoints in the internet of things malware: poster., , , , , и . WiSec, стр. 288-289. ACM, (2019)