From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation of Data Security Requirements in a Web-based Application for Interactive Medical Documentation., , и . HEALTHINF, стр. 352-359. SciTePress, (2015)Evaluation of in-memory storage engine for machine learning analysis of security events., , , , и . Concurr. Comput. Pract. Exp., (2017)Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes., , , , и . MSPN, том 9395 из Lecture Notes in Computer Science, стр. 28-40. Springer, (2015)Hierarchical object log format for normalisation of security events., , , , , и . IAS, стр. 25-30. IEEE, (2013)Analyzing Boundary Device Logs on the In-memory Platform., , , и . HPCC/CSS/ICESS, стр. 1367-1372. IEEE, (2015)Catch the Spike: On the Locality of Individual BGP Update Bursts., , и . MSN, стр. 78-83. IEEE Computer Society, (2013)Gathering and Analyzing Identity Leaks for Security Awareness., , , , и . PASSWORDS, том 9393 из Lecture Notes in Computer Science, стр. 102-115. Springer, (2014)High-Speed Security Log Analytics Using Hybrid Outlier Detection.. University of Potsdam, Germany, (2019)Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events, и . Computer Communications, (2013)