From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging client-side DNS failure patterns to identify malicious behaviors., , , , , , и . CNS, стр. 406-414. IEEE, (2015)Separation of benign and malicious network events for accurate malware family classification., , и . CNS, стр. 125-133. IEEE, (2015)Maximizing the bandwidth multiplier effect for hybrid cloud-P2P content distribution., , , , и . IWQoS, стр. 1-9. IEEE, (2012)Protocol independent multicast group aggregation scheme for the global area multicast., , , и . GLOBECOM, стр. 370-375. IEEE, (2000)Most Calls Are Local (But Some Are Regional): Dissecting Cellular Communication Patterns., , и . GLOBECOM, стр. 1-6. IEEE, (2016)A unifying infrastructure for Internet., , и . ICC, стр. 2641-2646. IEEE, (2002)Network delay guarantee for differentiated services in content-centric networking., , , , и . Comput. Commun., (2016)Principal component analysis of BGP update streams., , и . J. Commun. Networks, 12 (2): 191-197 (2010)From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP., , и . SIGMETRICS Perform. Evaluation Rev., 38 (3): 49-54 (2010)A security framework for protecting traffic between collaborative domains., , и . Microprocess. Microsystems, 28 (10): 547-559 (2004)