From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new scheme for improving the utilisation of nested-cloud resources., , и . Int. J. Embed. Syst., 11 (2): 170-181 (2019)GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption., , , и . Int. J. Embed. Syst., 10 (1): 62-70 (2018)An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU., , , , и . WASA (1), том 12384 из Lecture Notes in Computer Science, стр. 420-431. Springer, (2020)Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method., , , , , и . J. Univers. Comput. Sci., 25 (3): 203-221 (2019)A Hybrid Alarm Association Method Based on AP Clustering and Causality., , , , и . Wirel. Commun. Mob. Comput., (2021)Application of Grid Technologies in Linux Host Intrusion Detection System., и . CSO (1), стр. 13-17. IEEE Computer Society, (2009)Localization in Wireless Sensor Networks via Support Vector Regression., , и . WGEC, стр. 549-552. IEEE Computer Society, (2009)An Ant Colony Clustering Routing Algorithm for Wireless Sensor Networks., , и . WGEC, стр. 670-673. IEEE Computer Society, (2009)Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage., , , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 445-458. Springer, (2018)Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing., , и . Int. J. Embed. Syst., 11 (6): 707-718 (2019)