From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search., , , и . Int. J. Cooperative Inf. Syst., 9 (3): 229-254 (2000)User identification via neural network based language models., и . Int. J. Netw. Manag., (2019)CNSM 2019 special issue: Embracing the new wave of artificial intelligence., и . Int. J. Netw. Manag., (2021)Training genetic programming on half a million patterns: an example from anomaly detection., , и . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , и . Appl. Soft Comput., 11 (7): 4366-4383 (2011)A heuristic approach to network optimised mapping of a distributed resource discovery architecture., и . Int. J. Comput. Appl. Technol., 19 (1): 43-50 (2004)Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks., , и . VTC Spring, стр. 1-7. IEEE, (2022)The effect of routing under local information using a social insect metaphor., , и . IEEE Congress on Evolutionary Computation, стр. 1438-1443. IEEE, (2002)Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels., и . ARES, стр. 72:1-72:7. ACM, (2021)Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature., , и . ARES, стр. 124:1-124:9. ACM, (2022)