From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems., , и . FPS, том 12637 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2020)Detecting Spoofing and GPS Jamming in UAVs: Multiclass Approach to Attack Diagnosis., , , , , и . HICSS, стр. 538-547. ScholarSpace, (2024)OAuth 2.0-based authentication solution for FPGA-enabled cloud computing., , , , и . UCC Companion, стр. 13:1-13:6. ACM, (2021)Security policy architecture for 5G Networks., , и . NoF, стр. 37-41. IEEE, (2023)Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks., , , и . SAFE@CoNEXT, стр. 9-15. (2023)Optimal Access Control Deployment in Network Function Virtualization., , и . NOMS, стр. 1-9. IEEE, (2022)Characterizing Intrusion Detection Systems On Heterogeneous Embedded Platforms., , , , , и . DSD, стр. 278-285. IEEE, (2023)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , и . ARES, стр. 157-166. IEEE Computer Society, (2016)Backbone-based location-aided routing algorithm to reduce control packets of AODV protocol., и . Mobility Conference, стр. 15. ACM, (2006)SONICS: A Segmentation Method for Integrated ICS and Corporate System., , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 231-250. Springer, (2018)