From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A distributed host-based worm detection system., , , , , и . LSAD@SIGCOMM, стр. 107-113. ACM, (2006)Cooperative Response Strategies for Large Scale Attack Mitigation., , и . DISCEX (1), стр. 293-302. IEEE Computer Society, (2003)Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics., , , , , , и . ASONAM, стр. 195-202. IEEE Computer Society, (2011)A General Cooperative Intrusion Detection Architecture for MANETs., , , , , , , , , и 1 other автор(ы). IWIA, стр. 57-70. IEEE Computer Society, (2005)Detecting and Defending against Web-Server Fingerprinting., , , и . ACSAC, стр. 321-330. IEEE Computer Society, (2002)Your best might not be good enough: Ranking in collaborative social search engines., , , , , и . CollaborateCom, стр. 87-94. ICST / IEEE, (2011)Social Email: A Framework and Application for More Socially-Aware Communications., , и . SocInfo, том 6430 из Lecture Notes in Computer Science, стр. 203-215. Springer, (2010)A hybrid quarantine defense., , , , , и . WORM, стр. 73-82. ACM Press, (2004)Argumentation logic to assist in security administration., , , , , и . NSPW, стр. 43-52. ACM, (2012)A Bidding Game for Generators in the Presence of Flexible Demand., , , , , , и . Feedback Computing, USENIX Association, (2014)