From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events., , , и . IEICE Trans. Commun., 96-B (7): 1803-1813 (2013)Internet Anonymity in Syria, Challenges and Solution., и . ICITCS, том 215 из Lecture Notes in Electrical Engineering, стр. 177-186. Springer, (2012)Predictive Prefetching of Context-Aware Information in Mobile Networks., и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 919-927. Springer, (2006)SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things., , , , и . ASSS@AsiaCCS, стр. 1:1-1:14. ACM, (2023)Available Bandwidth Estimation Method Adaptive to Network Traffic Load Considering Fairness with UDT Flows., , и . ICITCS, стр. 1-4. IEEE Computer Society, (2015)A Secure Service Framework for Handling Security Critical Data on the Public Cloud., и . ICITCS, том 120 из Lecture Notes in Electrical Engineering, стр. 3-12. Springer, (2011)Location and routing optimization protocols supporting internet host mobility.. Newcastle University, Newcastle upon Tyne, UK, (1996)British Library, EThOS.Towards Sensor-Cloud Based Efficient Smart Healthcare Monitoring Framework using Machine Learning., , и . SMA, стр. 380-383. ACM, (2020)MSRM-IoT: A Reliable Resource Management for Cloud, Fog, and Mist-Assisted IoT Networks., , и . IEEE Internet Things J., 9 (4): 2527-2537 (2022)A Survey on Applications of Artificial Intelligence for Pre-Parametric Project Cost and Soil Shear-Strength Estimation in Construction and Geotechnical Engineering., , , , , и . Sensors, 21 (2): 463 (2021)