From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The JRA-25 Reanalysis, , , , , , , , , и 7 other автор(ы). Journal of the Meteorological Society of Japan, 85 (3): 369--432 (2007)Efficient Shortest Path Routing Algorithms for Distributed XML Processing., , , и . WEBIST, стр. 265-272. ScitePress, (2019)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , и . Int. J. Netw. Comput., 12 (2): 467-492 (2022)Utilizing Multi-Networks Task Scheduler for Streaming Applications., , и . ICPP Workshops, стр. 25-30. IEEE Computer Society, (2008)Tracing Advanced Persistent Threats in Networked Systems., , , , и . SafeConfig, стр. 179-187. Springer, (2012)A New Task Scheduling Method for Distributed Programs which Require Memory Management in Grids., и . SAINT Workshops, стр. 666-673. IEEE Computer Society, (2004)An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS., , , и . CANDAR, стр. 239-244. IEEE, (2019)Characterizing Transactions with Data Transfer on Multi-server Systems., , , , , и . INCoS, стр. 404-408. IEEE Computer Society, (2010)A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks., , , и . Int. J. Netw. Comput., 10 (2): 213-226 (2020)KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud., , , и . CANDAR (Workshops), стр. 398-404. IEEE, (2021)