From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector., , , , и . Int. J. Medical Informatics, (2019)Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security., , , , , , и . Sensors, 19 (14): 3119 (2019)Reliability, Security, and Privacy in Power Grids., , , , и . Computer, 55 (9): 85-88 (2022)Stochastic Optimization of Electric Vehicle Charging Stations., , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1-7. IEEE, (2019)New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis., и . Panhellenic Conference on Informatics, стр. 143-147. IEEE Computer Society, (2009)Layered backpressure scheduling for delay reduction in ad hoc networks., и . WOWMOM, стр. 1-9. IEEE Computer Society, (2011)Security and Privacy in Fog Computing: Challenges., , , , , , и . IEEE Access, (2017)A novel intrusion detection method based on OCSVM and K-means recursive clustering., и . EAI Endorsed Trans. Security Safety, 2 (3): e5 (2015)Privacy-preserving schemes for Ad Hoc Social Networks: A survey., , и . CoRR, (2016)DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data., , , , и . IEEE Access, (2022)