From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving the Defence against Web Server Fingerprinting by Eliminating Compliance Variation., , , , и . FCST, стр. 227-232. IEEE Computer Society, (2010)Data BER analysis of OAM-assisted physical layer authentication system., , , , и . IEICE Electron. Express, 19 (23): 20220434 (2022)Feature selection considering two types of feature relevancy and feature interdependency., , , , и . Expert Syst. Appl., (2018)A Classification of Cluster Validity Indexes Based on Membership Degree and Applications., , , и . WISM (1), том 6987 из Lecture Notes in Computer Science, стр. 43-50. Springer, (2011)Trajectory planning based on multi-objective optimization for redundant robots., , , и . ICSAI, стр. 133-138. IEEE, (2016)An Intelligent Analysis Model for Multisource Volatile Memory., , , , , и . J. Networks, 8 (11): 2699-2705 (2013)Topology2Vec: Topology Representation Learning For Data Center Networking., , , , и . IEEE Access, (2018)A semantics-based approach to multi-source heterogeneous information fusion in the internet of things., , , , и . Soft Comput., 21 (8): 2005-2013 (2017)SPS-VN: Research on the Security Policy System for Virtual Network., , , , , и . Security and Management, стр. 44-47. CSREA Press, (2006)Defense against DNS Man-In-The-Middle Spoofing., , , , и . WISM (1), том 6987 из Lecture Notes in Computer Science, стр. 312-319. Springer, (2011)