From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm., , , , , и . Comput. Networks, (2022)KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT., , , и . IEEE Internet Things J., 9 (23): 23750-23771 (2022)Towards DDoS detection mechanisms in Software-Defined Networking., , , , , , и . J. Netw. Comput. Appl., (2021)Image-based malware classification using section distribution information., , , , и . Comput. Secur., (2021)Heterogeneous Sparse Relational Data Co-clustering in Social Network., , , , и . UIC/ATC/ScalCom, стр. 77-84. IEEE Computer Society, (2015)Information Diffusion and Influence Measurement Based on Interaction in Microblogging., , , , и . SMP, том 489 из Communications in Computer and Information Science, стр. 129-140. Springer, (2014)Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security., , , , , и . Wirel. Commun. Mob. Comput., (2020)BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence., , , , и . Comput. Networks, (апреля 2023)DataSESec: Security Monitoring for Data Share and Exchange Platform., , , , и . APWeb/WAIM (2), том 11642 из Lecture Notes in Computer Science, стр. 422-427. Springer, (2019)Anomaly Detection in Microblogging via Co-Clustering., , , , , и . J. Comput. Sci. Technol., 30 (5): 1097-1108 (2015)