From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network., , , , и . SecureComm (1), том 304 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 490-508. Springer, (2019)Identifying heavy hitters in high-speed network monitoring., , и . Sci. China Inf. Sci., 53 (3): 659-676 (2010)Modeling of Hierarchical Index System for Network Operation Security., и . ISCTCS, том 320 из Communications in Computer and Information Science, стр. 580-590. Springer, (2012)MDBA: Detecting Malware based on Bytes N-Gram with Association Mining., , , и . ICT, стр. 227-232. IEEE, (2019)Computer Vulnerability Evaluation Using Fault Tree Analysis., , , и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 302-313. Springer, (2005)Modeling Social Engineering Botnet Dynamics across Multiple Social Networks., , , , , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 261-272. Springer, (2012)A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)., , , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 284-294. Springer, (2018)GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression., , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 310-328. Springer, (2018)Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)., , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 222-232. Springer, (2018)MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users., , , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 329-345. Springer, (2018)