From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Establishing trusted Machine-to-Machine communications in the Internet of Things through the use of behavioural tests.. University of Liverpool, UK, (2017)British Library, EThOS.A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments., и . IEEE Syst. J., 13 (1): 389-399 (2019)A Joint Traffic Flow Estimation and Prediction Approach for Urban Networks., , , и . PerCom Workshops, стр. 9-14. IEEE, (2023)MEDA: A Machine Emulation Detection Algorithm., и . SECRYPT, стр. 228-235. SciTePress, (2015)Molecular-Based Nano-Communication Network: A Ring Topology Nano-Bots for In-Vivo Drug Delivery Systems., , и . IEEE Access, (2019)Generating Synthetic Tabular Data for DDoS Detection Using Generative Models., , и . TrustCom, стр. 1436-1442. IEEE, (2023)Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems., , и . NANOCOM, стр. 16:1-16:6. ACM, (2019)A fake timing attack against behavioural tests used in embedded IoT M2M communications., и . CSNet, стр. 1-6. IEEE, (2017)The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system., , , и . ICWCA, стр. 1-6. IEEE, (2012)Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs., , , и . SECRYPT, стр. 488-493. SciTePress, (2013)