Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)Finding Logical Consequences Using Unskolemization., and . ISMIS, volume 689 of Lecture Notes in Computer Science, page 255-264. Springer, (1993)Insider attack detection using weak indicators over network flow data., , , , , and . MILCOM, page 1-6. IEEE, (2015)Leveraging social network for predicting demand and estimating available resources for communication network management., , , , and . Integrated Network Management, page 547-554. IEEE, (2011)Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples., , and . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, volume 11329 of Lecture Notes in Computer Science, page 16-29. Springer, (2018)Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems., , , , , and . MILCOM, page 993-998. IEEE, (2022)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , and . POLICY, page 102-105. IEEE Computer Society, (2009)DRAMA: Distributed Policy Management for MANETs., and . POLICY, page 235-237. IEEE Computer Society, (2008)Policy-Based Mobile Ad Hoc Network Management., , , , , , and . POLICY, page 35-44. IEEE Computer Society, (2004)PECAN: Policy-Enabled Configuration Across Networks., , , , , , , , , and 1 other author(s). POLICY, page 52-62. IEEE Computer Society, (2003)