From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revisiting anomaly detection system design philosophy., , , и . ACM Conference on Computer and Communications Security, стр. 1473-1476. ACM, (2013)Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure., и . ACM Trans. Inf. Syst. Secur., 18 (2): 7:1-7:30 (2015)Firewall Policy Reconnaissance: Techniques and Analysis., , и . IEEE Trans. Inf. Forensics Secur., 9 (2): 296-308 (2014)Configuration-based IDS for advanced metering infrastructure., и . ACM Conference on Computer and Communications Security, стр. 451-462. ACM, (2013)Probabilistic model checking for AMI intrusion detection., и . SmartGridComm, стр. 468-473. IEEE, (2013)Randomizing AMI configuration for proactive defense in smart grid., , и . SmartGridComm, стр. 618-623. IEEE, (2013)Towards a science of anomaly detection system evasion., , , и . CNS, стр. 460-468. IEEE, (2015)On stochastic risk ordering of network services for proactive security management., , и . NOMS, стр. 994-1000. IEEE, (2012)Accuracy improving guidelines for network anomaly detection systems., , и . J. Comput. Virol., 7 (1): 63-81 (2011)Two-tier data-driven intrusion detection for automatic generation control in smart grid., , , , и . CNS, стр. 292-300. IEEE, (2014)