From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , и . J. Inf. Process., (2023)How beneficial is peer-to-peer DMA?, , и . APSys, стр. 25-32. ACM, (2020)BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller., , и . PerCom Workshops, стр. 860-865. IEEE Computer Society, (2018)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , и . EICC, стр. 65-73. ACM, (2024)ARIA: interactive damage prediction system for urban flood using simulation and emulation federation platform., , , , , , , и . UbiComp/ISWC Adjunct, стр. 284-287. ACM, (2019)Extensions for Wireless Technology Emulation to Wire-based Network Testbed., , , , , , , и . WPMC, стр. 1-6. IEEE, (2021)Emulation-Based ICT System Resiliency Verification for Disaster Situations., , , , , , , и . SITIS, стр. 875-882. IEEE Computer Society, (2013)NETorium: high-fidelity scalable wireless network emulator., , , , и . AINTEC, стр. 25-32. ACM, (2016)AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons., , , , , , , , и . UbiComp/ISWC Adjunct, стр. 476-479. ACM, (2018)A Design of Stateless 5G Core Network with Procedural Processing., , , , и . BlackSeaCom, стр. 199-204. IEEE, (2023)