From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks., , , , и . KES-AMSTA, том 4953 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2008)Differential Kullback-Leibler Divergence Based Anomaly Detection Scheme in Sensor Networks., и . CIT, стр. 966-970. IEEE Computer Society, (2012)Secure Multiple Deployment in Wireless Sensor Networks., , и . MobiQuitous, стр. 1-4. IEEE Computer Society, (2007)A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy., , , , и . ICSI (2), том 9713 из Lecture Notes in Computer Science, стр. 306-313. Springer, (2016)Modeling on virtual network embedding using reinforcement learning., , , , , , , и . Concurr. Comput. Pract. Exp., (2020)Key Predistribution in Sensor Networks., , и . UIC, том 4159 из Lecture Notes in Computer Science, стр. 845-853. Springer, (2006)A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing., , , , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 619-626. IEEE, (2018)A Hexagon-Based Key Predistribution Scheme in Sensor Networks., , и . ICPP Workshops, стр. 175-180. IEEE Computer Society, (2006)Efficient Group Key Management Scheme in Wireless Sensor Networks., , и . IITSI, стр. 411-415. IEEE Computer Society, (2010)Key Management in Sensor Networks., , и . WASA, том 4138 из Lecture Notes in Computer Science, стр. 457-466. Springer, (2006)