From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal fitness aware cloud service composition using modified invasive weed optimization., , и . Swarm Evol. Comput., (2019)SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services., , , и . Soft Comput., 23 (13): 4701-4715 (2019)GRASP-based resource re-optimization for effective big data access in federated clouds., , , и . Future Gener. Comput. Syst., (2016)Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies., и . Comput. Secur., 27 (1-2): 48-62 (2008)Providing true end-to-end security in converged voice over IP infrastructures., и . Comput. Secur., 28 (6): 433-449 (2009)Audit-Based Access Control in Nomadic Wireless Environments., и . ICCSA (3), том 3982 из Lecture Notes in Computer Science, стр. 537-545. Springer, (2006)Trustworthy Opportunistic Access to the Internet of Services., , , , , , и . ICT-EurAsia, том 7804 из Lecture Notes in Computer Science, стр. 469-478. Springer, (2013)An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications., , , , и . INCoS, стр. 157-165. IEEE, (2013)Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome., , , и . NBiS, стр. 355-360. IEEE Computer Society, (2014)Analyzing the Internet Stability in Presence of Disasters., , , , и . CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 253-268. Springer, (2013)