Author of the publication

RPKI Deployment: Risks and Alternative Solutions.

, , , , , and . ICGEC (1), volume 387 of Advances in Intelligent Systems and Computing, page 299-310. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Concept Lattice-Based Kernel Method for Mining Knowledge in an M-Commerce System., , , and . ISNN (1), volume 4491 of Lecture Notes in Computer Science, page 1280-1285. Springer, (2007)Boosting Low-Complexity Vector Perturbation Variants Based on Rectangular Shaping., , , , and . IEEE Trans. Veh. Technol., 70 (7): 7211-7215 (2021)Fighting Link Spam with a Two-Stage Ranking Strategy., , , and . ECIR, volume 4425 of Lecture Notes in Computer Science, page 699-702. Springer, (2007)RPKI Deployment: Risks and Alternative Solutions., , , , , and . ICGEC (1), volume 387 of Advances in Intelligent Systems and Computing, page 299-310. Springer, (2015)Is DNS Ready for Ubiquitous Internet of Things?, , , , and . IEEE Access, (2019)Boosting the Performance of Web Spam Detection with Ensemble Under-Sampling Classification., , , , and . FSKD (4), page 583-587. IEEE Computer Society, (2007)0-7695-2874-0.A novel collaborative filtering-based framework for personalized services in m-commerce., , , and . WWW, page 1251-1252. ACM, (2007)Finite-Time Convergent Modified Davidenko Method for Dynamic Nonlinear Equations., and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (4): 1630-1634 (April 2023)Co-training based semi-supervised Web spam detection., , , and . FSKD, page 789-793. IEEE, (2013)A Practical Framework of Blockchain in IoT Information Management., , , , , , , and . SMC, page 274-279. IEEE, (2023)