Vladimir V. Shakhov

Orcid: 0000-0002-4860-7552

According to our database1, Vladimir V. Shakhov authored at least 42 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Optimizing Urban Air Pollution Detection Systems.
Sensors, 2022

Route recommendation based on temporal-spatial metric.
Comput. Electr. Eng., 2022

Applying Change Point Detection Technique to Dynamically Support Network Security.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

On Reliability of Pipeline Monitoring Sensor Networks.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

Machine Learning Based Primary User Emulation Attack Detection.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

Sequential Statistical Analysis-Based Method for Attacks Detection in Cognitive Radio Networks.
Proceedings of the 27th Asia Pacific Conference on Communications, 2022

2021
Graph-based technique for survivability assessment and optimization of IoT applications.
Int. J. Softw. Tools Technol. Transf., 2021

From edge data to recommendation: A double attention-based deformable convolutional network.
Peer-to-Peer Netw. Appl., 2021

Analysis of a Network Stability-Aware Clustering Protocol for Cognitive Radio Sensor Networks.
IEEE Internet Things J., 2021

Efficient dummy generation for considering obstacles and protecting user location.
Concurr. Comput. Pract. Exp., 2021

On Modeling Air Pollution Detection With Internet of Vehicles.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Towards Edge Computing Based Monitoring for Smart Ports.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

An Effective Method for Ensuring the Reliability of a Critical Infrastructure Monitoring Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
EUMD: Efficient slot utilization based missing tag detection with unknown tags.
J. Netw. Comput. Appl., 2020

A Criterion for IDS Deployment on IoT Edge Nodes.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

Double Attention-based Deformable Convolutional Network for Recommendation.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Toward a Lightweight Intrusion Detection System for the Internet of Things.
IEEE Access, 2019

On Lightweight Method for Intrusions Detection in the Internet of Things.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019

2018
Depletion-of-Battery Attack: Specificity, Modelling and Analysis.
Sensors, 2018

2016
On efficiency improvement of energy harvesting wireless sensor networks.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Performance Evaluation of MAC Protocols in Energy Harvesting Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Operation strategy for energy harvesting wireless sensor networks.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

2014
A Fast Method for Network Topology Generating.
Proceedings of the Multiple Access Communications - 7th International Workshop, 2014

Reliability of Ad Hoc Networks with Imperfect Nodes.
Proceedings of the Multiple Access Communications - 7th International Workshop, 2014

2013
Experiment Design for Parameter Estimation in Sensing Models.
Proceedings of the Wireless Access Flexibility - First International Workshop, 2013

Flooding attack in energy harvesting wireless sensor networks.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Protecting Wireless Sensor Networks from Energy Exhausting Attacks.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
Potential intrusions in wireless networks.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
An Efficient Method for Proportional Differentiated Admission Control Implementation.
EURASIP J. Wirel. Commun. Netw., 2011

Optimization problems in proportional differentiated admission control.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
An Efficient Method for Proportional Differentiated Admission Control Implementation.
Proceedings of the Multiple Access Communications, Third International Workshop, 2010

2008
Denial of Sleeping: Performance Analysis and Counteracting Strategy.
Proceedings of the Computer-Human Interaction, 8th Asia-Pacific Conference, 2008

2007
On Modeling Counteraction against TCP SYN Flooding.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Reliability of Wireless Sensor Network with Sleeping Nodes.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Routing and wavelength assignment in optical WDM networks with maximum quantity of edge disjoint paths.
Photonic Netw. Commun., 2006

On Modelling Reliability in RED Gateways.
Proceedings of the Computational Science, 2006

An Enhanced RED-Based Scheme for Differentiated Loss Guarantees.
Proceedings of the Management of Convergence Networks and Services, 2006

2004
Discord model for detecting unexpected demands in mobile networks.
Future Gener. Comput. Syst., 2004

Routing and Wavelength Assignments in Optical WDM Networks with Maximum Quantity of Edge Disjoint Paths.
Proceedings of the Computational Science, 2004

2003
Discord Detection for a Process with a Predefined Interval of Observations.
Int. J. Comput. Math., 2003

Analytical Approach for Channel Assignments in Cellular Networks.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
On Detecting Unsteady Demand in Mobile Networking Environment.
Proceedings of the Computational Science - ICCS 2002, 2002


  Loading...