From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on Embedded-Based Wireless Authentication System., , , и . ICICA (1), том 307 из Communications in Computer and Information Science, стр. 469-475. Springer, (2012)Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , и . RecSys, стр. 385-386. ACM, (2016)An automatic application signature construction system for unknown traffic., , и . Concurr. Comput. Pract. Exp., 22 (13): 1927-1944 (2010)Advance in Multiply Sectioned Bayesian Networks: Sensor Network Practitioners' Perspective., и . ETFA, стр. 590-593. IEEE, (2006)A Constructive Graphical Model Approach for Knowledge-Based Systems: A Vehicle Monitoring Case Study., и . Comput. Intell., 19 (3): 284-309 (2003)A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers., , , , , и . INFOCOM, стр. 2557-2565. IEEE, (2019)Anomaly-Based Insider Threat Detection Using Deep Autoencoders., , , , и . ICDM Workshops, стр. 39-48. IEEE, (2018)Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice., , , и . INCoS, стр. 181-188. IEEE, (2013)A survey on security control and attack detection for industrial cyber-physical systems., , , , и . Neurocomputing, (2018)The structure of communities in scale-free networks., , , , , и . Concurr. Comput. Pract. Exp., (2017)