From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Events Correlation for Federated Networks Protection System., , , , и . ServiceWave, том 6994 из Lecture Notes in Computer Science, стр. 100-111. Springer, (2011)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , и . IEA/AIE (1), том 6096 из Lecture Notes in Computer Science, стр. 671-680. Springer, (2010)Ear Biometrics.. Encyclopedia of Biometrics, Springer US, (2015)Intersection Approach to Vulnerability Handling., , , и . WEBIST (1), стр. 171-174. INSTICC Press, (2010)The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good., , и . Pers. Ubiquitous Comput., 25 (5): 843-852 (2021)First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions., , , и . Pers. Ubiquitous Comput., 27 (2): 193-202 (апреля 2023)Practical Applications of Data Analysis, Classification and Anomaly Detection., , , и . J. Univers. Comput. Sci., 26 (4): 432-433 (2020)Hunting cyberattacks: experience from the real backbone network., , , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (2): 128-146 (2022)Statistical and signal-based network traffic recognition for anomaly detection., , , и . Expert Syst. J. Knowl. Eng., 29 (3): 232-245 (2012)Comprehensive Approach to Information Sharing for increased Network Security and Survivability.. Cybern. Syst., 44 (6-7): 550-568 (2013)