From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Phishing Detection with Popular Search Engines: Simple and Effective., и . FPS, том 6888 из Lecture Notes in Computer Science, стр. 194-207. Springer, (2011)Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks., , , , и . ICCSA (2), том 10961 из Lecture Notes in Computer Science, стр. 50-61. Springer, (2018)Automated Cash Mining Attacks on Mobile Advertising Networks., , , и . ACISP, том 11547 из Lecture Notes in Computer Science, стр. 679-686. Springer, (2019)Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels., , и . ICUIMC, стр. 57. ACM, (2011)Don't count the number of friends when you are spreading information in social networks.. ICUIMC, стр. 43:1-43:7. ACM, (2014)Security challenges with network functions virtualization., , , и . Future Gener. Comput. Syst., (2017)Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service., , , и . IMCOM, стр. 62:1-62:5. ACM, (2016)eAPT: enhancing APT with a mirror site resolver., , , и . ISSRE Workshops, стр. 117-122. IEEE, (2020)An Eye for an Eye: Economics of Retaliation in Mining Pools., , , и . AFT, стр. 169-182. ACM, (2019)MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management., , и . SVCC, том 1383 из Communications in Computer and Information Science, стр. 98-108. Springer, (2020)