From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An analytical study of cache invalidation algorithms in mobile environments., , и . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Special Issue: Distributed Objects and Applications '99., и . Concurr. Comput. Pract. Exp., 13 (7): 503-505 (2001)Book Preview., , и . Interactions, 7 (6): 47-50 (2000)Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems., , , и . ACM Trans. Cyber Phys. Syst., 5 (1): 10:1-10:28 (2021)Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences., , , , и . Comput. Secur., (2020)Editorial Sustainable Defence and Security Systems., и . IEEE Trans. Sustain. Comput., 8 (4): 537-539 (октября 2023)Network Traffic Analysis and SCADA Security., , , , и . Handbook of Information and Communication Security, Springer, (2010)Energy-efficient tailoring of VM size and tasks in cloud data centers., , , и . NCA, стр. 99-103. IEEE Computer Society, (2017)SUPER - Visual Interaction with an Object-Based ER Model., , , , , и . ER, том 645 из Lecture Notes in Computer Science, стр. 340-356. Springer, (1992)RADAR: Reactive Concept Drift Management with Robust Variational Inference for Evolving IoT Data Streams., , , и . ICDE, стр. 1995-2007. IEEE, (2023)