From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack., , , и . Comput. J., 58 (4): 973-985 (2015)Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function., , и . ICIC (1), том 4113 из Lecture Notes in Computer Science, стр. 553-562. Springer, (2006)Proposion and Analysis of a TCP Feature of P2P Traffic., , и . PAKDD, том 4426 из Lecture Notes in Computer Science, стр. 1148-1155. Springer, (2007)Three-dimensional histogram shifting for reversible data hiding., и . Multim. Syst., 24 (1): 95-109 (2018)A video steganography algorithm for MVC without distortion drift., , , , и . ICAILP, стр. 738-742. IEEE, (2014)The Proposition and Certification of P2P Media Streaming Traffic Features., , и . ICNC (5), стр. 281-285. IEEE Computer Society, (2008)A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction., , , и . FSKD (4), стр. 307-311. IEEE Computer Society, (2007)0-7695-2874-0.Methodology of Network Intrusion Detection System Penetration Testing., и . WAIM, стр. 546-551. IEEE Computer Society, (2008)A Wav-Audio Steganography Algorithm Based on Amplitude Modifying., и . CIS, стр. 489-493. IEEE Computer Society, (2014)P2P Traffic Identification by TCP Flow Analysis., , и . IWNAS, стр. 47-50. IEEE Computer Society, (2006)