From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging social network for predicting demand and estimating available resources for communication network management., , , , и . Integrated Network Management, стр. 547-554. IEEE, (2011)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , и . ICCCN, стр. 1-8. IEEE, (2017)Insider attack detection using weak indicators over network flow data., , , , , и . MILCOM, стр. 1-6. IEEE, (2015)Finding Logical Consequences Using Unskolemization., и . ISMIS, том 689 из Lecture Notes in Computer Science, стр. 255-264. Springer, (1993)Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems., , , , , и . MILCOM, стр. 993-998. IEEE, (2022)Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples., , и . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, том 11329 из Lecture Notes in Computer Science, стр. 16-29. Springer, (2018)A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses., , , , , , и . CNS, стр. 1-9. IEEE, (2020)Measuring the Effectiveness of Network Deception., , , , , , и . ISI, стр. 142-147. IEEE, (2018)Policy-Based Mobile Ad Hoc Network Management., , , , , , и . POLICY, стр. 35-44. IEEE Computer Society, (2004)PECAN: Policy-Enabled Configuration Across Networks., , , , , , , , , и 1 other автор(ы). POLICY, стр. 52-62. IEEE Computer Society, (2003)