From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services., , и . KSII Trans. Internet Inf. Syst., 12 (4): 1572-1593 (2018)The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function., , , , и . ICTC, стр. 1335-1337. IEEE, (2018)Survey on network protocol reverse engineering approaches, methods and tools., , , , , и . APNOMS, стр. 271-274. IEEE, (2017)Framework for precise protocol reverse engineering based on network traces., , , и . NOMS, стр. 1-4. IEEE, (2018)Payload signature structure for accurate application traffic classification., , , и . APNOMS, стр. 1-4. IEEE, (2016)SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications., , , , и . APNOMS, стр. 350-353. IEEE, (2017)Structured whitelist generation in SCADA network using PrefixSpan algorithm., , , , и . APNOMS, стр. 326. IEEE, (2017)Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure., , , , и . NOMS, стр. 1-4. IEEE, (2018)Block Analysis in Bitcoin System Using Clustering with Dimension Reduction., , , , , и . APNOMS, стр. 1-4. IEEE, (2019)A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis., , , , , и . APNOMS, стр. 1-6. IEEE, (2019)