From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer Log Anomaly Detection Using Frequent Episodes., , и . AIAI, том 296 из IFIP Advances in Information and Communication Technology, стр. 417-422. Springer, (2009)Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems., , , и . EANN/AIAI (1), том 363 из IFIP Advances in Information and Communication Technology, стр. 392-401. Springer, (2011)Towards holistic security management through coherent measuring., и . ECSA Companion Volume, стр. 155-161. ACM, (2010)A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network., и . EANN, том 517 из Communications in Computer and Information Science, стр. 171-180. Springer, (2015)Towards Trusted Environment in Cloud Monitoring., , и . ITNG, стр. 180-185. IEEE Computer Society, (2014)Characterizing Mobile Network Daily Traffic Patterns by 1-Dimensional SOM and Clustering., и . EANN, том 311 из Communications in Computer and Information Science, стр. 325-333. Springer, (2012)Comprehensive Log Compression with Frequent Patterns., , , , и . DaWaK, том 2737 из Lecture Notes in Computer Science, стр. 360-370. Springer, (2003)Remarks on the Industrial Application of Inductive Database Technologies., , и . Constraint-Based Mining and Inductive Databases, том 3848 из Lecture Notes in Computer Science, стр. 196-215. Springer, (2004)TASA: Telecommunication Alarm Sequence Analyzer or how to enjoy faults in your network., , , , и . NOMS, стр. 520-529. IEEE, (1996)Architecture for High Confidence Cloud Security Monitoring., , , , и . IC2E, стр. 195-200. IEEE Computer Society, (2015)