From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interdependency Analysis in Security Investment against Strategic Attacks., и . Inf. Syst. Frontiers, 22 (1): 187-201 (2020)SANT: Static Analysis of Native Threads for Security Vetting of Android Applications., и . ISC Int. J. Inf. Secur., 14 (1): 13-25 (2022)A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language., , и . ECOWS, стр. 203-212. IEEE Computer Society, (2007)A conceptual framework for specification, analysis, and design of anonymity services., и . EDBT/ICDT Workshops, том 360 из ACM International Conference Proceeding Series, стр. 131-138. ACM, (2009)Measuring of Strategies' Similarity in Automated Negotiation., , и . IMECS, стр. 859-863. Newswood Limited, (2007)An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks., , и . IWSEC, том 7038 из Lecture Notes in Computer Science, стр. 129-143. Springer, (2011)A machine learning approach for detecting and categorizing evasion sources in Android malware., , , и . ISCISC, стр. 28-34. IEEE, (2021)Privacy, reputation, and incentive provision for vehicular social networks., , и . J. Reliab. Intell. Environ., 9 (4): 447-461 (декабря 2023)Comparing Negotiation Strategies Based on Offers., , и . DMBiz@PAKDD, том 177 из Frontiers in Artificial Intelligence and Applications, стр. 87-98. IOS Press, (2007)Randomized gossip algorithms under attack., и . Int. J. Inf. Sec., 13 (4): 391-402 (2014)