From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , и . IEEE Vehicular Technology Magazine, (2013)Multicast source handover scheme based on proxy router discovery., , и . BROADNETS, стр. 865-874. IEEE, (2005)ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family., , , , , и . PRDC, стр. 257-262. IEEE, (2018)Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header., , , и . FMEC, стр. 1-6. IEEE, (2021)Accountable security mechanism based on security service level agreement., , , , , , и . ISCC, стр. 404-410. IEEE Computer Society, (2013)Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices., , , , и . ISCC, стр. 274-277. IEEE, (2018)Risk visualization and alerting system: architecture and proof-of-concept implementation., , , , и . SESP@CCS Asia, стр. 3-10. ACM, (2013)A KEM/DEM-Based Construction for Secure and Anonymous Communication., , , и . COMPSAC Workshops, стр. 680-681. IEEE Computer Society, (2015)The Usability of Metadata for Android Application Analysis., , , , , и . ICONIP (1), том 9947 из Lecture Notes in Computer Science, стр. 546-554. (2016)Intrinsically Motivated Self-Supervised Deep Sensorimotor Learning for Grasping., , и . IROS, стр. 3496-3502. IEEE, (2018)