From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reliable detection of compressed and encrypted data., , , , и . Neural Comput. Appl., 34 (22): 20379-20393 (2022)Replication Schemes in Unattended Wireless Sensor Networks., , и . NTMS, стр. 1-5. IEEE, (2011)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)Hierarchies of keys in secure multicast communications., , и . Journal of Computer Security, 18 (5): 839-860 (2010)Obfuscation of sensitive data in network flows., , , , и . INFOCOM, стр. 2372-2380. IEEE, (2012)Data Security in Unattended Wireless Sensor Networks., , , , и . IEEE Trans. Computers, 58 (11): 1500-1511 (2009)OliVaR: Improving Olive Variety Recognition using Deep Neural Networks., , , , , , , , и . CoRR, (2023)Minerva: A File-Based Ransomware Detector., , , , и . CoRR, (2023)Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems., и . Comput. J., 34 (6): 503-513 (1991)