From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey., , , , и . ACM Comput. Surv., 55 (9): 191:1-191:43 (2023)Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media., , и . TrustCom, стр. 856-863. IEEE, (2020)A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC., , и . e-Forensics, том 8 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 116-121. Springer, (2009)Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains., и . SP (Workshops), стр. 128-135. IEEE, (2020)Googling Forensics., , и . Australian Computer, Network & Information Forensics Conference, стр. 62-67. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics., и . ARES, стр. 1355-1360. IEEE Computer Society, (2008)Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis., , и . ARES, стр. 1361-1368. IEEE Computer Society, (2008)Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation., и . ARES, стр. 1012-1017. IEEE Computer Society, (2009)Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks., , и . ICII, стр. 139-145. IEEE, (2018)A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities., , и . Sensors, 23 (17): 7391 (сентября 2023)