From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation., , , , , и . CoRR, (2022)Characterizing EOSIO Blockchain., , , , , , , , и . CoRR, (2020)ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks., , , , , и . IEEE Internet Things J., 10 (14): 12521-12536 (июля 2023)STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews., , , , , , , и . IEEE Trans. Software Eng., 49 (8): 4135-4151 (августа 2023)Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Towards automatically generating block comments for code snippets., , , , , , , , и . Inf. Softw. Technol., (2020)LDFR: Learning deep feature representation for software defect prediction., , , , , , , , и . J. Syst. Softw., (2019)EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification., , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (5): 3521-3538 (2022)A Centralized Monitoring Infrastructure for Improving DNS Security., , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 18-37. Springer, (2010)Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals., , и . EURASIP J. Adv. Signal Process., (2009)