From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments., , , и . NDSS, The Internet Society, (2005)Security Modeling of Autonomous Systems: A Survey., , , и . ACM Comput. Surv., 52 (5): 91:1-91:34 (2019)A Deep Learning Approach for Network Intrusion Detection System., , , и . BICT, стр. 21-26. ICST/ACM, (2015)Early Detection of Host-based Intrusions in Linux Environment., , , и . EIT, стр. 475-479. IEEE, (2020)Security Enhancement of Over-the-Air Update for Connected Vehicles., , , и . WASA, том 10874 из Lecture Notes in Computer Science, стр. 853-864. Springer, (2018)Normal and anomalous traffic flow pattern analysis for organizational networks., , , и . CCECE, стр. 1-4. IEEE, (2017)A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem., , , и . ICISSP, стр. 396-403. SCITEPRESS, (2022)Practical Proactive Integrity Preservation: A Basis for Malware Defense., , , и . SP, стр. 248-262. IEEE Computer Society, (2008)A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN), , и . CoRR, (2016)Experiences from a Time-Condensed Computer Security Class.. ITNG, стр. 482-487. IEEE Computer Society, (2010)