From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Online Unsupervised Dynamic Window Method to Track Repeating Patterns From Sensor Data., , , , и . IEEE Trans. Cybern., 52 (6): 5148-5160 (2022)Divide and Learn: A Divide and Conquer Approach for Predict+Optimize., , , , , и . CoRR, (2020)An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries., , , , и . Australasian Conference on Artificial Intelligence, том 7691 из Lecture Notes in Computer Science, стр. 649-660. Springer, (2012)Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs., , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 214-225. Springer, (2003)Exploiting Traffic Localities for Efficient Flow State Lookup., , и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 1133-1145. Springer, (2005)Adjusted Probabilistic Packet Marking for IP Traceback., , и . NETWORKING, том 2345 из Lecture Notes in Computer Science, стр. 697-708. Springer, (2002)Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis., , и . Networking, том 3976 из Lecture Notes in Computer Science, стр. 1092-1098. Springer, (2006)Smart car parking: Temporal clustering and anomaly detection in urban car parking., , , и . ISSNIP, стр. 1-6. IEEE, (2014)CPU-based DoS attacks against SIP servers., , и . NOMS, стр. 41-48. IEEE, (2008)Relieving hot spots in collaborative intrusion detection systems during worm outbreaks., , и . NOMS, стр. 49-56. IEEE, (2008)