From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Problem of NIDS Evasion in Mobile Networks., , , и . NTMS, стр. 1-6. IEEE, (2011)Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults., , , , и . NSDI, стр. 153-168. USENIX Association, (2009)Analysis, prevention and detection of ransomware attacks on Industrial Control Systems., , и . NCA, стр. 1-5. IEEE, (2021)Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning., , , и . NCA, стр. 235-242. IEEE, (2022)Accountable and privacy-aware flexible car sharing and rental services., , , и . NCA, стр. 1-7. IEEE, (2021)Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems., , и . ISA, том 200 из Communications in Computer and Information Science, стр. 101-110. Springer, (2011)Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults (Superseded by, , , , и . (2008)The Network Perspective of Cloud Security., , , и . NCCA, стр. 75-82. IEEE Computer Society, (2015)Dynamic load balancing for network intrusion detection systems based on distributed architectures., , , и . NCA, стр. 153-160. IEEE Computer Society, (2007)Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators., , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 626-636. (2016)