From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AIMED: Evolving Malware with Genetic Programming to Evade Detection., , и . TrustCom/BigDataSE, стр. 240-247. IEEE, (2019)Fast Learning Neural Network Intrusion Detection System., и . AIMS, том 5637 из Lecture Notes in Computer Science, стр. 187-190. Springer, (2009)On the Path to High Precise IP Geolocation: A Self-Optimizing Model., , , и . CoRR, (2020)DMEF: Dynamic Malware Evaluation Framework., , , , и . NOMS, стр. 1-7. IEEE, (2022)Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies., , , , , и . CoNEXT, стр. 530-531. ACM, (2020)Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD., , , и . NOMS, стр. 1-5. IEEE, (2020)Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)Towards an Accounting System for Multi-Provider Grid Environments., , , и . Integrated Network Management, стр. 60-69. IEEE, (2007)A Revised Attack Taxonomy for a New Generation of Smart Attacks., , и . Computer and Information Science, 7 (3): 18-30 (2014)Service Management Platform: The Next Step in Management Tools.. DSOM, том 1960 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2000)