From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms., , , и . J. Inf. Process., 22 (2): 118-129 (2014)Obtaining Sensing Data Based on the Proximity of Sensor Nodes., , , , и . SAINT, стр. 409-412. IEEE Computer Society, (2008)Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms., , и . SAINT, стр. 345-348. IEEE Computer Society, (2008)A Generic API for Retrieving Human-Oriented Information from Social Network Services., , , , и . SAINT Workshops, стр. 33. IEEE Computer Society, (2007)Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software., , и . SAINT Workshops, стр. 31. IEEE Computer Society, (2007)Nazca: A Geographic Location Service., , , , , и . SAINT Workshops, стр. 51. IEEE Computer Society, (2007)Context-aware content-provision service for shopping malls based on ubiquitous service-oriented network framework and authentication and access control agent framework., , , , , , и . CCNC, стр. 1330-1331. IEEE, (2006)A Two-Step Execution Mechanism for Thin Secure Hypervisors., , , , , , , , , и 2 other автор(ы). SECURWARE, стр. 129-135. IEEE Computer Society, (2009)Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships., , , и . SAINT, стр. 451-456. IEEE Computer Society, (2011)Trust-based SPIT detection by using call duration and social reliability., , , и . APCC, стр. 98-103. IEEE, (2013)