From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Arbitration of many thousand flows at 100G and beyond., , , , , , и . INA-OCMC@HiPEAC, стр. 5-8. ACM, (2013)Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation., , , и . CNSM, стр. 212-218. IEEE Computer Society, (2018)CCA: An ML Pipeline for Cloud Anomaly Troubleshooting., , , , , и . AAAI, стр. 13167-13169. AAAI Press, (2022)A scalable synthetic traffic model of Graph500 for computer networks analysis., , , , , , , , , и . Concurr. Comput. Pract. Exp., (2017)Real-time security services for SDN-based datacenters., , , , , , , , , и . CNSM, стр. 1-9. IEEE Computer Society, (2017)How elastic is your virtualized datacenter fabric?, , , и . INA-OCMC@HiPEAC, стр. 17-20. ACM, (2013)Catch It If You Can: Real-Time Network Anomaly Detection with Low False Alarm Rates., , , , и . ICMLA, стр. 924-929. IEEE, (2017)Multivariate Anomaly Detection with Domain Clustering., , , и . SoCC, стр. 193-199. ACM, (2023)All routes to efficient datacenter fabrics., , , , , и . INA-OCMC@HiPEAC, стр. 4:1-4:4. ACM, (2014)