From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymity in Preference-Aware Location-based Services without Third Trusted-Party.. MobiQuitous, стр. 283-284. ICST / ACM, (2015)Distributed Provision and Management of Security Services in Globus Toolkit 4., , , , и . OTM Conferences (2), том 4276 из Lecture Notes in Computer Science, стр. 1325-1335. Springer, (2006)ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing., , , и . HealthCom, стр. 1-8. IEEE, (2018)What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself., , , и . HPCC/CSS/ICESS, стр. 1221-1228. IEEE, (2014)Collecting Experience Data from Remotely Hosted Learning Applications., , , , и . REV, 22, стр. 170-181. Springer, (2017)An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios., , , и . IET Inf. Secur., 17 (4): 553-566 (июля 2023)A privacy-preserving recommender system for mobile commerce.. CNS, стр. 725-726. IEEE, (2015)Bibliometric Analysis of the Last Ten Years of the European Conference on Technology-Enhanced Learning., , и . EC-TEL, том 12884 из Lecture Notes in Computer Science, стр. 337-341. Springer, (2021)Advancing Threat Detection in Fog Computing: A Comprehensive Approach to Real-Time Analysis and Model Generation., , , , и . FMEC, стр. 162-169. IEEE, (2024)Enhacing Logistics with Computer Vision and Fog Computing-Driven Auto-ID Technologies., , , , и . FMEC, стр. 220-227. IEEE, (2024)