From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A connection management protocol for stateful inspection firewalls in multi-homed networks., , и . ICC, стр. 1887-1891. IEEE, (2004)Reducing Payload Scans for Attack Signature Matching Using Rule Classification., и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 350-360. Springer, (2008)Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations., , , и . ICOIN, том 5200 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2007)A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs., , , , и . GLOBECOM, IEEE, (2006)Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation., , , и . VTC Fall, стр. 1-5. IEEE, (2006)Screening Smartphone Applications Using Behavioral Signatures., , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 14-27. Springer, (2013)UDP-Based Active Scan for IoT Security (UAIS)., , и . KSII Trans. Internet Inf. Syst., 15 (1): 20-34 (2021)Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly., и . KSII Trans. Internet Inf. Syst., 4 (4): 671-690 (2010)Bayesian memory-based reputation system., , , , и . MobiMedia, том 329 из ACM International Conference Proceeding Series, стр. 9. ICST, (2007)OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept., , , и . DSN, стр. 174-185. IEEE, (2021)