From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk-averse bi-level stochastic network interdiction model for cyber-security risk management., , , и . Int. J. Crit. Infrastructure Prot., (2021)Wireless LAN transmitter location under the threat of jamming attacks., и . Comput. Oper. Res., (2019)A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption., , и . Eur. J. Oper. Res., 285 (2): 670-694 (2020)Robust facility location: Hedging against failures., , , , и . Reliab. Eng. Syst. Saf., (2014)Chapel HyperGraph Library (CHGL)., , , , , , , , , и . HPEC, стр. 1-6. IEEE, (2018)A Visual Evaluation Study of Graph Sampling Techniques., , , , , , и . Visualization and Data Analysis, стр. 110-117. Society for Imaging Science and Technology, (2017)Bot Classification for Real-Life Highly Class-Imbalanced Dataset., , , , и . DASC/PiCom/DataCom/CyberSciTech, стр. 565-572. IEEE Computer Society, (2017)Towards Scalable Planning of Wireless Networks., , , , , и . IM, стр. 629-633. IFIP, (2019)Security in Wireless Networks: A Tutorial., , и . Examining Robustness and Vulnerability of Networked Systems, том 37 из NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2014)Stochastic Programming Approach for Resource Selection Under Demand Uncertainty., , , , , , и . JSSPP, том 11332 из Lecture Notes in Computer Science, стр. 107-126. Springer, (2018)