From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function., , , , и . ICTC, стр. 1335-1337. IEEE, (2018)DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning., , , , , и . APNOMS, стр. 1-4. IEEE, (2019)Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm., , , и . IEEE Access, (2019)Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure., , , , и . NOMS, стр. 1-4. IEEE, (2018)A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis., , , , , и . APNOMS, стр. 1-6. IEEE, (2019)Clustering method in protocol reverse engineering for industrial protocols., , , и . Int. J. Netw. Manag., (2020)A message keyword extraction approach by accurate identification of field boundaries., , , и . Int. J. Netw. Manag., (2021)HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods., , , и . (мая 2022)A Study on the Method to Extract Clear Fields From the Private Protocol., , , и . ICTC, стр. 1397-1402. IEEE, (2018)A study on near-real-time geometric correction system of drones image., , , и . ICOIN, стр. 70-72. IEEE, (2018)