From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks., , и . Integrated Network Management, стр. 236-245. IEEE, (2007)Automated Decision Making for Active Cyber Defense: Panel Discussion., , и . SafeConfig@CCS, стр. 59. ACM, (2015)Predicting Zero-day Malicious IP Addresses., , , и . SafeConfig@CCS, стр. 1-6. ACM, (2017)Probabilistic model checking for AMI intrusion detection., и . SmartGridComm, стр. 468-473. IEEE, (2013)A Dynamic Group Management Framework for Large-scale Distributed Event Monitoring.. Integrated Network Management, стр. 361-374. IEEE, (2001)Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications, , , , , и . Mobile Networks and Applications, (13.07.2011)SCAP Based Configuration Analytics for Comprehensive Compliance Checking., и . SafeConfig, IEEE, (2011)Towards a Unified Modeling and Verification of Network and System Security Configurations., , и . SafeConfig, стр. 3-19. Springer, (2012)ThreatZoom: neural network for automated vulnerability mitigation., и . HotSoS, стр. 24:1-24:3. ACM, (2019)A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring., , , и . E2EMON, стр. 1-7. IEEE Computer Society, (2007)