From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An anomaly detection system based on variable N-gram features and one-class SVM., , , и . Inf. Softw. Technol., (2017)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , и . GLOBECOM, стр. 293-298. IEEE, (2022)P-Code Based Classification to Detect Malicious VBA Macro., и . ISNCC, стр. 1-6. IEEE, (2020)Attribute-Based Encryption for Preserving Smart Home Data Privacy., , , и . ICOST, том 10461 из Lecture Notes in Computer Science, стр. 185-197. Springer, (2017)Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach., , , , , и . IEEE Open J. Commun. Soc., (2024)An Evaluation of Machine Learning Algorithms in an Experimental Structural Health Monitoring System Incorporating LoRa IoT Connectivity., , , , и . I2MTC, стр. 1-6. IEEE, (2022)Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption., , , и . MILCOM, стр. 49-54. IEEE, (2022)A dynamic compiler for embedded Java virtual machines., , , , , , и . PPPJ, том 91 из ACM International Conference Proceeding Series, стр. 100-106. ACM, (2004)Common Criteria Approach to J2ME CLDC Security Requirements., , , и . SoMeT, том 147 из Frontiers in Artificial Intelligence and Applications, стр. 177-194. IOS Press, (2006)SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers., , , и . CSCloud, стр. 163-170. IEEE Computer Society, (2017)