From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Unified Modeling and Verification of Network and System Security Configurations., , и . SafeConfig, стр. 3-19. Springer, (2012)Automated Firewall Analytics - Design, Configuration and Optimization. Springer, (2014)Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks., , и . Integrated Network Management, стр. 236-245. IEEE, (2007)Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks., и . IEEE Trans. Network and Service Management, 9 (4): 459-472 (2012)Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance., , , и . INFOCOM, стр. 866-874. IEEE, (2007)IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems., , , и . CoRR, (2018)Automated pseudo-live testing of firewall configuration enforcement., , и . IEEE J. Sel. Areas Commun., 27 (3): 302-314 (2009)ThreatZoom: neural network for automated vulnerability mitigation., и . HotSoS, стр. 24:1-24:3. ACM, (2019)A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring., , , и . E2EMON, стр. 1-7. IEEE Computer Society, (2007)Audio transmission over the Internet: experiments and observations., , , и . ICC, стр. 552-556. IEEE, (2003)