From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

I-CIFA: An improved collusive interest flooding attack in named data networking., , , и . J. Inf. Secur. Appl., (2021)SEDP-based detection of low-rate DoS attacks., , , и . Int. J. Commun. Syst., 28 (11): 1772-1788 (2015)Correlation-based Detection of LDoS Attack., , , и . J. Softw., 7 (10): 2341-2348 (2012)An adaptive adjustment strategy for bolt posture errors based on an improved reinforcement learning algorithm., , , , , и . Appl. Intell., 51 (6): 3405-3420 (2021)Blockchain-Based Trust Model for Air Traffic Management Network., , и . ICCCS, стр. 92-98. IEEE, (2021)Access control method for air ticket distribution system based on blockchain., , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 815-821. IEEE, (2022)A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM., , и . DataCom, том 13864 из Lecture Notes in Computer Science, стр. 127-141. Springer, (2022)Research on SWIM Cooperative Emergency Response and Resilient Disaster Recovery Based on Survivability., , и . ISADS, стр. 1-5. IEEE, (2023)A Detection Method for I-CIFA Attack in NDN Network., , , и . SmartCom, том 13202 из Lecture Notes in Computer Science, стр. 364-373. Springer, (2021)A New Transmitter Design for Wireless Power Transmission Systems with Compatible Circular and Solenoidal Receiving Coils., , , , , и . IECON, стр. 1-6. IEEE, (2023)