From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure prophet address allocation for MANETs., , и . Secur. Commun. Networks, 3 (1): 31-43 (2010)A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems., , и . IPCCC, стр. 486-490. IEEE Computer Society, (2008)Combined fitness function based particle swarm optimization algorithm for system identification., , и . Comput. Ind. Eng., (2016)The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android., и . GSKI (2), том 849 из Communications in Computer and Information Science, стр. 641-649. Springer, (2017)Research on a Blockchain Consensus Algorithm Based on Digital Copyright., , , и . BlockSys, том 1267 из Communications in Computer and Information Science, стр. 565-574. Springer, (2020)Reactive ID Assignment for Wireless Sensor Networks., , и . Int. J. Wirel. Inf. Networks, 13 (4): 317-328 (2006)Risk assessment of security systems based on entropy theory and the Neyman-Pearson criterion., , , , и . Reliab. Eng. Syst. Saf., (2015)Sufficient Conditions for Generating Group Level Sparsity in a Robust Minimax Framework., и . NIPS, стр. 2577-2585. Curran Associates, Inc., (2010)A New Strategy for Batch Reactor's Temperature Control., , и . CSIE (5), стр. 56-61. IEEE Computer Society, (2009)CCRS: An Optimized Algorithm Based on CRS in Distributed Storage System., , , , , и . FCST, стр. 360-363. IEEE Computer Society, (2015)