From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spatial Density-based User Identity Linkage across Social Networks., , , , , , , и . IEEE Big Data, стр. 656-664. IEEE, (2022)Security importance assessment for system objects and malware detection., , , , и . Comput. Secur., (2017)Linking User Identities Across Social Networks via Frequency Domain Analysis., , и . IFIP Networking, стр. 1-8. IEEE, (2023)DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps., , , и . ACM TUR-C, стр. 137:1-137:9. ACM, (2019)HMGR: A Hybrid Model for Geolocation Recommendation., , , , , и . BigData, том 14203 из Lecture Notes in Computer Science, стр. 48-62. Springer, (2023)Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network., , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 307-326. Springer, (2015)DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis., , , , , , , , , и . ICC, стр. 2331-2337. IEEE, (2023)Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data., , , , , , и . EDGE, том 14205 из Lecture Notes in Computer Science, стр. 69-81. Springer, (2023)Probabilistic Inference on Integrity for Access Behavior Based Malware Detection., , , и . RAID, том 9404 из Lecture Notes in Computer Science, стр. 155-176. Springer, (2015)Centrality metrics of importance in access behaviors and malware detections., , , и . ACSAC, стр. 376-385. ACM, (2014)