From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment., , и . USENIX Security Symposium, USENIX Association, (1993)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , и . IBM J. Res. Dev., 60 (4): 9 (2016)Secure RPC Authentication (SRA) for TELNET and FTP., , и . USENIX Security Symposium, USENIX Association, (1993)FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics., , , , , и . ICDE, стр. 1316-1327. IEEE Computer Society, (2015)Scalable analytics to detect DNS misuse for establishing stealthy communication channels., , , , , , и . IBM J. Res. Dev., 60 (4): 3 (2016)URET: Universal Robustness Evaluation Toolkit (for Evasion)., , , , , и . USENIX Security Symposium, стр. 3817-3833. USENIX Association, (2023)BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks., , , , , , и . DSN, стр. 479-490. IEEE Computer Society, (2016)Texas A&M University Anarchistic Key Authorization (AKA)., , и . USENIX Security Symposium, USENIX Association, (1996)MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation., , , , , и . EURASIP J. Information Security, (2014)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , и . IRI, стр. 8-15. IEEE Computer Society, (2014)