From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling., и . IEEE Trans. Inf. Forensics Secur., 13 (4): 850-860 (2018)An adaptable deep learning-based intrusion detection system to zero-day attacks., , , и . J. Inf. Secur. Appl., (августа 2023)A Lightweight Key Establishment Scheme for Wireless Sensor Networks., , и . NTMS, стр. 1-5. IEEE, (2009)RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks., , , и . CNSR, стр. 458-460. IEEE Computer Society, (2009)Voice quality measurement in a typical router-based network., и . LCN, стр. 274-275. IEEE Computer Society, (2007)Low-power arithmetic unit for DSP applications., , и . SoC, стр. 68-71. IEEE, (2011)RT-TelSurg: Real Time Telesurgery Using SDN, Fog, and Cloud as Infrastructures., и . IEEE Access, (2021)Lazy instruction scheduling: keeping performance, reducing power., , и . ISLPED, стр. 375-380. ACM, (2008)An empirical study on TCP flow interarrival time distribution for normal and anomalous traffic., и . Int. J. Commun. Syst., (2017)Dead Block Placement Avoidance in L1 Data Caches., и . IASTED PDCS, стр. 51-56. IASTED/ACTA Press, (2005)