From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Boundary Device Logs on the In-memory Platform., , , и . HPCC/CSS/ICESS, стр. 1367-1372. IEEE, (2015)CGA integration into IPsec/IKEv2 authentication., , , , и . SIN, стр. 326-330. ACM, (2013)Evaluation of in-memory storage engine for machine learning analysis of security events., , , , и . Concurr. Comput. Pract. Exp., (2017)Automatic vulnerability detection for weakness visualization and advisory creation., , , и . SIN, стр. 229-236. ACM, (2015)Automatic Vulnerability Classification Using Machine Learning., , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2017)Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)Automatic detection of vulnerabilities for advanced security analytics., , и . APNOMS, стр. 471-474. IEEE, (2015)Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes., , , , и . MSPN, том 9395 из Lecture Notes in Computer Science, стр. 28-40. Springer, (2015)Hierarchical object log format for normalisation of security events., , , , , и . IAS, стр. 25-30. IEEE, (2013)Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour., , , , и . MSPN, том 9395 из Lecture Notes in Computer Science, стр. 134-150. Springer, (2015)