From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing a VM-level vertical scalability service in current cloud platforms: a new hope for wearable computers.. Turkish J. Electr. Eng. Comput. Sci., (2017)A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware., , , и . IEEE Access, (2019)Weighted grid authorization graph (WGAG)., , , , , и . COMNET, стр. 1-5. IEEE, (2017)A cloud-based architecture for mitigating privacy issues in online social networks., , , , и . Int. Arab J. Inf. Technol., 16 (5): 879-888 (2019)Cloud computing in the quantum era., , и . CNS, стр. 1-4. IEEE, (2019)Designing a Secure Exam Management System (SEMS) for M-Learning Environments., , , , и . IEEE Trans. Learn. Technol., 9 (3): 258-271 (2016)A Rough Set based PCM for authorizing grid resources., , , и . ISDA, стр. 391-396. IEEE, (2010)Concurrent HCM for Authorizing Grid Resources., , , и . ICDCIT, том 7154 из Lecture Notes in Computer Science, стр. 255-256. Springer, (2012)Enhancing the Hierarchical Clustering Mechanism of Storing Resources' Security Policies in a Grid Authorization System., , , и . ICDCIT, том 5966 из Lecture Notes in Computer Science, стр. 134-139. Springer, (2010)MaldomDetector: A system for detecting algorithmically generated domain names with machine learning., , , и . Comput. Secur., (2020)