From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Abstracting Audit Data for Lightweight Intrusion Detection., , и . ICISS, том 6503 из Lecture Notes in Computer Science, стр. 201-215. Springer, (2010)Randomizing SVM Against Adversarial Attacks Under Uncertainty., , и . PAKDD (3), том 10939 из Lecture Notes in Computer Science, стр. 556-568. Springer, (2018)Analysis and Modeling of Social Influence in High Performance Computing Workloads., , , , и . Euro-Par (1), том 6852 из Lecture Notes in Computer Science, стр. 193-204. Springer, (2011)High-speed web attack detection through extracting exemplars from HTTP traffic., и . SAC, стр. 1538-1543. ACM, (2011)Cost Reduction for Web-Based Data Imputation., , , и . DASFAA (2), том 8422 из Lecture Notes in Computer Science, стр. 438-452. Springer, (2014)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , и . ISNN (2), том 3174 из Lecture Notes in Computer Science, стр. 657-662. Springer, (2004)Delve: A Data Set Retrieval and Document Analysis System., и . ECML/PKDD (3), том 10536 из Lecture Notes in Computer Science, стр. 400-403. Springer, (2017)TideWatch: Fingerprinting the cyclicality of big data workloads., , , и . INFOCOM, стр. 2031-2039. IEEE, (2014)Artificial muscles for wearable assistance and rehabilitation., , и . Frontiers Inf. Technol. Electron. Eng., 19 (11): 1303-1315 (2018)Constructing attribute weights from computer audit data for effective intrusion detection., , и . J. Syst. Softw., 82 (12): 1974-1981 (2009)