From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses., , , , и . RAID, том 2516 из Lecture Notes in Computer Science, стр. 36-53. Springer, (2002)A comparative evaluation of two algorithms for Windows Registry Anomaly Detection., , , , , , и . J. Comput. Secur., 13 (4): 659-693 (2005)Adaptive Model Generation., , , и . Applications of Data Mining in Computer Security, Springer, (2002)