From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic immune intrusion detection system for IPv6., , и . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, том 5812 из SPIE Proceedings, стр. 374-. SPIE, (2005)LeakProber: a framework for profiling sensitive data leakage paths., , , и . CODASPY, стр. 75-84. ACM, (2011)The Global Synthetical Processing of Network Security Events., , , , и . FSKD (2), стр. 492-496. IEEE Computer Society, (2007)0-7695-2874-0.A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift., , , и . IEEE Trans. Circuits Syst. Video Techn., 20 (10): 1320-1330 (2010)A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video., , и . Multim. Tools Appl., 75 (10): 5959-5980 (2016)A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers., , , и . MUE, стр. 729-732. IEEE Computer Society, (2007)An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video., , , и . CSCloud, стр. 256-260. IEEE Computer Society, (2016)Towards Identifying True Threat from Network Security Data., , , , и . PAISI, том 4430 из Lecture Notes in Computer Science, стр. 160-171. Springer, (2007)Characterizing User Behavior in Weibo., , , и . MUSIC, стр. 60-65. IEEE, (2012)A Secure Routing Protocol for Mobile Ad hoc Networks., и . ACIS-ICIS, стр. 153-157. IEEE Computer Society, (2007)