From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Overview of Intrusion Detection Techniques.. The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project., , , , и . SIGMOD Record, 30 (4): 5-14 (2001)A cooperative intrusion detection system for ad hoc networks., и . SASN, стр. 135-147. ACM, (2003)Mining in a Data-Flow Environment: Experience in Network Intrusion Detection., , и . KDD, стр. 114-124. ACM, (1999)Combining Knowledge Discovery and Knowledge Engineering to Build IDSs., и . Recent Advances in Intrusion Detection, (1999)xBook: Redesigning Privacy Control in Social Networking Platforms., , и . USENIX Security Symposium, стр. 249-266. USENIX Association, (2009)Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats., , , , , и . CoRR, (2020)ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android., , , , и . ACM Conference on Computer and Communications Security, стр. 1120-1136. ACM, (2018)SURF: detecting and measuring search poisoning., , и . ACM Conference on Computer and Communications Security, стр. 467-476. ACM, (2011)Adaptive Intrusion Detection: A Data Mining Approach., , и . Artif. Intell. Rev., 14 (6): 533-567 (2000)