From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness., , и . CISRC, стр. 11:1-11:8. ACM, (2016)Data Security for Object-Oriented Programming Systems Based on Inference Engines (Abstract)., и . ACM Conference on Computer Science, стр. 411. ACM, (1990)Autonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networks., , и . J. Syst. Softw., 56 (3): 231-246 (2001)Automated discovery of concise predictive rules for intrusion detection., , , и . J. Syst. Softw., 60 (3): 165-175 (2002)Intelligent interfaces for secure multilevel database systems., и . IEA/AIE (2), стр. 977-981. ACM, (1989)Detection of Quality Visualization of Appendiceal Orifices Using Local Edge Cross-Section Profile Features and Near Pause Detection., , , , и . IEEE Trans. Biomed. Eng., 57 (3): 685-695 (2010)Polyp-Alert: Near real-time feedback during colonoscopy., , , , и . Comput. Methods Programs Biomed., 120 (3): 164-179 (2015)Leveraging Broadband Access for True On-Demand Delivery of Internet Videos., , и . SAINT, стр. 171-177. IEEE Computer Society, (2004)Composition of Services for Notification in Smart Homes., , и . ISUC, стр. 75-78. IEEE Computer Society, (2008)A Framework for Cost Sensitive Assessment of Intrusion Response Selection., , , и . COMPSAC (1), стр. 355-360. IEEE Computer Society, (2009)