From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Engineers Deal with Mathematics Solving Differential Equation., , , , , и . ICCS, том 51 из Procedia Computer Science, стр. 1977-1985. Elsevier, (2015)A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata., , и . IbPRIA (1), том 3522 из Lecture Notes in Computer Science, стр. 411-418. Springer, (2005)Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata., , , , и . KES, том 2773 из Lecture Notes in Computer Science, стр. 1207-1214. Springer, (2003)A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.. ACRI, том 4173 из Lecture Notes in Computer Science, стр. 627-635. Springer, (2006)A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata., , и . IbPRIA (1), том 4477 из Lecture Notes in Computer Science, стр. 571-578. Springer, (2007)On the invertible cellular automata 150 over Fp., и . Appl. Math. Comput., 219 (10): 5427-5432 (2013)3D medical data security protection., , и . Expert Syst. Appl., (2016)Security Countermeasures of a SCIRAS Model for Advanced Malware Propagation., , и . IEEE Access, (2019)A computational propagation model for malware based on the SIR classic model., , и . Neurocomputing, (2022)A Graph Cellular Automata Model to Study the Spreading of an Infectious Disease., , , , , и . MICAI (1), том 7629 из Lecture Notes in Computer Science, стр. 458-468. Springer, (2012)