From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data., , , , и . CoRR, (2020)PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts., , , , , и . ICMLA (2), стр. 60-65. IEEE, (2013)978-0-7695-5144-9.A Survey of Intrusion Detection Systems Leveraging Host Data., , , , и . ACM Comput. Surv., 52 (6): 128:1-128:35 (2020)ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)., , , , , и . CoRR, (2020)Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach., и . Comput. Secur., (2020)Automatic Labeling for Entity Extraction in Cyber Security., , , и . CoRR, (2013)Developing an Ontology for Cyber Security Knowledge Graphs., , , , , , , и . CISR, стр. 12:1-12:4. ACM, (2015)situ: Situational understanding and discovery for cyber attacks., , , , , , и . IEEE VAST, стр. 307-308. IEEE Computer Society, (2012)A Holistic Approach to Evaluating Cyber Security Defensive Capabilities., и . CoRR, (2019)Time-Based CAN Intrusion Detection Benchmark., , , , , и . CoRR, (2021)