From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verification of the Effectiveness to Monitor Darknet across Multiple Organizations., , , , , , , , , и . CANDAR (Workshops), стр. 346-351. IEEE, (2021)Continuous and Multiregional Monitoring of Malicious Hosts., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 2101-2103. ACM, (2020)Dual-sensor camera for acquiring image sequences with different spatio-temporal resolution., , , , , и . AVSS, стр. 450-455. IEEE Computer Society, (2005)HOUND: Log Analysis Support for Threat Hunting by Log Visualization., , , и . IIAI-AAI, стр. 653-656. IEEE, (2022)Development of White List Based Autonomous Evolution of Defense System for RAT Malware., , , , , , и . AsiaJCIS, стр. 95-101. IEEE Computer Society, (2018)CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs., , , и . IWSEC, том 13504 из Lecture Notes in Computer Science, стр. 85-104. Springer, (2022)Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results., , , , , , , , и . NBiS, стр. 135-139. IEEE Computer Society, (2016)