From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

xBook: Redesigning Privacy Control in Social Networking Platforms., , и . USENIX Security Symposium, стр. 249-266. USENIX Association, (2009)Combining Knowledge Discovery and Knowledge Engineering to Build IDSs., и . Recent Advances in Intrusion Detection, (1999)ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android., , , , и . ACM Conference on Computer and Communications Security, стр. 1120-1136. ACM, (2018)SURF: detecting and measuring search poisoning., , и . ACM Conference on Computer and Communications Security, стр. 467-476. ACM, (2011)Adaptive Intrusion Detection: A Data Mining Approach., , и . Artif. Intell. Rev., 14 (6): 533-567 (2000)Anomaly Detection Using Call Stack Information, , , , и . #IEEE03#, (2003)An Overview of Intrusion Detection Techniques.. The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions., , , , , , и . Recent Advances in Intrusion Detection, том 1907 из Lecture Notes in Computer Science, стр. 49-65. Springer, (2000)Environment-Sensitive Intrusion Detection., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2005)A cooperative intrusion detection system for ad hoc networks., и . SASN, стр. 135-147. ACM, (2003)