From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital Forensics Meets Blockchain: Enhancing Evidence Authenticity and Traceability., , , и . ICCR, стр. 1-6. IEEE, (2024)A Labeled Transactions-Based Dataset on the Ethereum Network., , , и . ACeS, том 1347 из Communications in Computer and Information Science, стр. 61-79. Springer, (2020)Integrating Enhanced Security Protocols with Moving Object Detection: A Yolo-Based Approach for Real-Time Surveillance., , и . ICCR, стр. 1-6. IEEE, (2024)Cloud Computing Simulators: A Review., и . ACIT, стр. 1-14. IEEE, (2023)Securing Software Defined Networking Using Intrusion Detection System - A Review., , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 417-446. Springer, (2021)Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , и . IEEE Access, (2020)Intrusion Detection System using Modified Arithmetic Optimization Algorithm for Large-scale IoT., , и . ICCR, стр. 1-6. IEEE, (2024)Comparative Evaluation of Bio-Inspired Feature Selection Methods in Intrusion Detection., , и . ICCR, стр. 1-6. IEEE, (2024)New Text Classification Strategy Based on a Word Embedding and Noise-Words Removal., и . ACIT, стр. 1-16. IEEE, (2023)Intrusion Detection Systems in Fog Computing - A Review., , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 481-504. Springer, (2021)