From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges., , , , , и . IEEE Access, (2020)Detecting malicious behaviour using supervised learning algorithms of the function calls., и . Int. J. Electron. Secur. Digit. Forensics, 5 (2): 90-109 (2013)CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model., , , , и . Int. J. Intell. Syst., 37 (9): 5768-5795 (2022)Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System., , и . IEEE Internet Things J., 11 (3): 3896-3908 (февраля 2024)Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions., , , , , и . IEEE Trans. Ind. Informatics, 18 (5): 3501-3509 (2022)Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT., , , и . IEEE Trans. Ind. Informatics, 17 (12): 8442-8452 (2021)Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery., , , , , и . IEEE Trans. Ind. Informatics, 19 (4): 5593-5601 (апреля 2023)Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities., , и . Microprocess. Microsystems, (2021)Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions., , , , и . IEEE Commun. Surv. Tutorials, 23 (4): 2098-2130 (2021)A secure localization scheme based on trust assessment for WSNs using blockchain technology., , , , , и . Future Gener. Comput. Syst., (2021)