From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiple Instance Learning for Malware Classification., , и . CoRR, (2017)Reducing false positives of network anomaly detection by local adaptive multivariate smoothing., , и . J. Comput. Syst. Sci., 83 (1): 43-57 (2017)Solving inaccessibility in multi-agent systems by mobile middle-agents., , , , и . Multiagent Grid Syst., 1 (2): 73-87 (2005)Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper., , , , и . PAAMS, том 155 из Advances in Intelligent and Soft Computing, стр. 291-294. Springer, (2012)On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System., , и . IAT, стр. 196-203. IEEE Computer Society, (2011)978-0-7695-4513-4.Agent Methods for Network Intrusion Detection and Response., , , , , и . HoloMAS, том 4659 из Lecture Notes in Computer Science, стр. 149-160. Springer, (2007)Incrementally Refined Acquaintance Model for Consortia Composition., , , и . CIA, том 5180 из Lecture Notes in Computer Science, стр. 280-291. Springer, (2008)Representing Context for Multiagent Trust Modeling., , , и . IAT, стр. 737-746. IEEE Computer Society, (2006)Network Intrusion Detection by Means of Community of Trusting Agents., , , , и . IAT, стр. 498-504. IEEE Computer Society, (2007)Improving Anomaly Detection Error Rate by Collective Trust Modeling., , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 398-399. Springer, (2008)