From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Steganography in Modern Smartphones and Mitigation Techniques., и . CoRR, (2014)Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , и . Special Issue of the Springer Telecommunication Systems Journal: Future Internet Services and Architectures - Trends and Visions, (2010)Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity., , и . EuroS&P Workshops, стр. 521. IEEE, (2020)Providing End-to-End Security Using Quantum Walks in IoT Networks., , , , , , , и . IEEE Access, (2020)Multilevel Steganography: Improving Hidden Communication in Networks., , и . J. Univers. Comput. Sci., 18 (14): 1967-1986 (2012)Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models., , , , , и . DSAA, стр. 1-9. IEEE, (2023)Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach., и . SECRYPT, стр. 576-586. SCITEPRESS, (2021)Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications., , , и . ARES, стр. 64:1-64:9. ACM, (2022)Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels., , , и . ARES, стр. 73:1-73:8. ACM, (2021)Do Dark Web and Cryptocurrencies Empower Cybercriminals?, , , , и . ICDF2C, том 441 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 277-293. Springer, (2021)