From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Applications' State via System Calls Activity: A Pipeline Approach., , , и . ICECS, стр. 1-6. IEEE, (2021)Efficient low cost supervisory system for Internet of Things enabled smart home., , , , и . ICC Workshops, стр. 864-869. IEEE, (2017)A verification methodology for a wireless body sensor network functionality., , и . BHI, стр. 635-639. IEEE, (2014)Formalizing electrocardiogram (ECG) signal behavior in event-B., , и . Healthcom, стр. 55-60. IEEE, (2014)Drones network security enhancement using smart based block-chain technology., , , , и . ICCR, стр. 1-6. IEEE, (2022)A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model., , , и . ICCR, стр. 1-9. IEEE, (2022)A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System., , , , , , , , и . Sensors, 22 (16): 6243 (2022)Simulation Framework for a Security Protocol for Wireless Body Sensor Networks., , и . LCN Workshops, стр. 248-253. IEEE Computer Society, (2016)Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research., , , , и . CoRR, (2022)Digital Forensic Analysis of Files Using Deep Learning., , , и . ICSPIS, стр. 1-4. IEEE, (2020)