From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning for Detecting Data Exfiltration., , , и . CoRR, (2020)DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning., , , , , , , , и . NDSS, The Internet Society, (2023)Profiler: Distributed Model to Detect Phishing., , , , , и . ICDCS, стр. 1336-1337. IEEE, (2022)Demo - MaLFraDA: A Machine Learning Framework with Data Airlock., , , , и . CCS, стр. 3523-3525. ACM, (2022)Collaborative analysis of genomic data: vision and challenges., , , , и . CIC, стр. 77-86. IEEE, (2021)Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns., , , , , , , , и . CoRR, (2022)Demonstration: Semantic Web Enabled Smart Farm with GSN., , , , , и . ISWC (Posters & Demos), том 1035 из CEUR Workshop Proceedings, стр. 41-44. CEUR-WS.org, (2013)WattEdge: A Holistic Approach for Empirical Energy Measurements in Edge Computing., , , и . ICSOC, том 13121 из Lecture Notes in Computer Science, стр. 531-547. Springer, (2021)A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data., , , , , и . ISC, том 13118 из Lecture Notes in Computer Science, стр. 70-94. Springer, (2021)Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities., , , , и . J. Parallel Distributed Comput., (2019)