From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs., и . ARC, том 4943 из Lecture Notes in Computer Science, стр. 51-62. Springer, (2008)An Improved Reduction Algorithm With Deeply Pipelined Operators., , и . SMC, стр. 3060-3065. IEEE, (2009)Super fast hardware string matching., , , и . FPT, стр. 385-388. IEEE, (2006)A Neural-Network Based DDoS Detection System Using Hadoop and HBase., , и . HPCC/CSS/ICESS, стр. 1326-1331. IEEE, (2015)Automated Detection and Analysis for Android Ransomware., , , , , и . HPCC/CSS/ICESS, стр. 1338-1343. IEEE, (2015)Detectors for Intent ICC Security Vulnerability with Android IDE., , , и . ICUFN, стр. 355-357. IEEE, (2018)OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development., , и . DSC, стр. 1-2. IEEE, (2018)Labware for networking protocols and wireless security using Android-enabled mobile devices., , , , и . ACM Southeast Regional Conference, стр. 13:1-13:6. ACM, (2014)Leveraging CS capstone project and green smart energy computing with WSN in a box., и . ACM Southeast Regional Conference, стр. 84. ACM, (2010)Binary malware image classification using machine learning with local binary pattern., и . IEEE BigData, стр. 4664-4667. IEEE Computer Society, (2017)