From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , и 11 other автор(ы). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)An Empirical Study Profiling Internet Pirates., , , и . IFIP Int. Conf. Digital Forensics, том 410 из IFIP Advances in Information and Communication Technology, стр. 257-272. Springer, (2013)An Exploratory Profiling Study of Online Auction Fraudsters., , , , , и . IFIP Int. Conf. Digital Forensics, том 433 из IFIP Advances in Information and Communication Technology, стр. 43-56. Springer, (2014)The Cloud Storage Ecosystem - A New Business Model for Internet Piracy?, , , и . IFIP Int. Conf. Digital Forensics, том 484 из IFIP Advances in Information and Communication Technology, стр. 237-255. Springer, (2016)Profiling Flash Mob Organizers in Web Discussion Forums., , и . IFIP Int. Conf. Digital Forensics, том 484 из IFIP Advances in Information and Communication Technology, стр. 281-293. Springer, (2016)IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks., , , , , , , , , и 8 other автор(ы). ISPAN, стр. 581-586. IEEE Computer Society, (2004)