From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hierarchical object log format for normalisation of security events., , , , , и . IAS, стр. 25-30. IEEE, (2013)Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes., , , , и . MSPN, том 9395 из Lecture Notes in Computer Science, стр. 28-40. Springer, (2015)Analyzing Boundary Device Logs on the In-memory Platform., , , и . HPCC/CSS/ICESS, стр. 1367-1372. IEEE, (2015)Catch the Spike: On the Locality of Individual BGP Update Bursts., , и . MSN, стр. 78-83. IEEE Computer Society, (2013)Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events., и . Comput. Commun., 36 (15-16): 1592-1605 (2013)High-Speed Security Log Analytics Using Hybrid Outlier Detection.. University of Potsdam, Germany, (2019)Gathering and Analyzing Identity Leaks for Security Awareness., , , , и . PASSWORDS, том 9393 из Lecture Notes in Computer Science, стр. 102-115. Springer, (2014)K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analytics., и . CoRR, (2019)Implementation of Data Security Requirements in a Web-based Application for Interactive Medical Documentation., , и . HEALTHINF, стр. 352-359. SciTePress, (2015)