From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection and Recognition of File Masquerading for E-mail and Data Security., и . CNSA, том 89 из Communications in Computer and Information Science, стр. 253-262. Springer, (2010)Performance analysis of mobile agent failure recovery in e-service applications., , и . Comput. Stand. Interfaces, 32 (1-2): 38-43 (2010)Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks., и . CIT, том 3356 из Lecture Notes in Computer Science, стр. 160-168. Springer, (2004)Advanced mobile agent security models for code integrity and malicious availability check., , , , и . J. Netw. Comput. Appl., 33 (6): 661-671 (2010)Dynamic resource management for downlink multimedia traffic in OFDMA cellular networks., , , , и . Kaleidoscope, стр. 1-7. IEEE, (2009)An intelligent technique to detect file formats and e-mail spam., и . A2CWiC, стр. 53:1-53:6. ACM, (2010)Analysis of accounting models for the detection of duplicate requests in web services., , , , и . J. King Saud Univ. Comput. Inf. Sci., 25 (1): 7-24 (2013)Performance Evaluation of Energy Efficient On-demand Routing Algorithms for MANET., , и . ICIIS, стр. 1-5. IEEE, (2008)Performance Analysis of a Cellular CDMA-TDD System to Support Asymmetric Internet Traffic., и . HPCNCS, стр. 118-125. ISRST, (2008)Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites., , и . NPC, том 7513 из Lecture Notes in Computer Science, стр. 129-137. Springer, (2012)