From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving the Confidential Data Totalization., , и . IMIS, стр. 826-830. IEEE Computer Society, (2013)High-Speed Forensic Technology Against Targeted Cyber Attacks (Extended Abstract)., , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 946. Springer, (2017)Developing the Analysis Tool of Cyber-Attacks by Using CTI and Attributes of Organization., , , , , и . AINA Workshops, том 927 из Advances in Intelligent Systems and Computing, стр. 673-682. Springer, (2019)Extracting Characteristic Structures among Words in Semistructured Documents., , , , , и . PAKDD, том 2336 из Lecture Notes in Computer Science, стр. 356-367. Springer, (2002)Verification of the Injection Enhancement Effect in IGBTs by Measuring the Electron and Hole Currents Separately., , , , , , , , , и 8 other автор(ы). ESSDERC, стр. 26-29. IEEE, (2018)A Fast RSA Implementation on Itanium 2 Processor., , и . ICICS, том 4307 из Lecture Notes in Computer Science, стр. 507-518. Springer, (2006)Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , и 2 other автор(ы). J. Inf. Process., (2021)Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding., , , , , и . COMPSAC, стр. 1504-1509. IEEE, (2020)Switching of 3300V Scaled IGBT by 5V Gate Drive., , , , , , , , , и 13 other автор(ы). ASICON, стр. 1-3. IEEE, (2019)