From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications., , , , , , и . IEEE Access, (2020)Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications., , , , , , и . IEEE Access, (2020)A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education., , и . ES, стр. 81-88. IEEE Computer Society, (2016)Efficient Scrambling-Substitution Image Security Scheme using Chaotic Arnold-Logistic Maps in the Discrete Cosine Transform. International Journal of Computer Networks & Communications (IJCNC), 14 (6): 13 (ноября 2022)An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model., , , , , и . Comput. Syst. Sci. Eng., 46 (1): 897-911 (2023)Review of Contemporary Database Design and Implication for Big Data., , , и . Int. J. Smart Educ. Urban Soc., 12 (4): 1-11 (2021)A Byzantine Fault Tolerance Model for a Multi-cloud Computing., , и . CSE, стр. 130-137. IEEE Computer Society, (2013)Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume., , , , , , и . Comput. Syst. Sci. Eng., 40 (3): 913-926 (2022)A New approach using redundancy technique to improve security in cloud computing., , и . CyberSec, стр. 230-235. IEEE, (2012)Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems., , и . Multim. Tools Appl., 83 (12): 35629-35672 (апреля 2024)