From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User Access Domain Management Systems - ADAMS., и . ACISP, том 1270 из Lecture Notes in Computer Science, стр. 50-61. Springer, (1997)A comparative study on structure of the motivation for information security by security incident experiences., , , , и . ICIS, том 403 из ACM International Conference Proceeding Series, стр. 9-16. ACM, (2009)Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation., , и . NBiS, стр. 541-545. IEEE Computer Society, (2010)Heuristics for Detecting Botnet Coordinated Attacks., , , и . ARES, стр. 603-607. IEEE Computer Society, (2010)Principal Component Analysis of Botnet Takeover., , и . Inf. Media Technol., 6 (4): 1241-1250 (2011)How Many Malicious Scanners Are in the Internet?, и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 381-390. Springer, (2006)Access Control for Inter-Organizational Computer Network Environment., , и . WWCA, том 1274 из Lecture Notes in Computer Science, стр. 394-409. Springer, (1997)Orthogonal Expansion of Port-scanning Packets., , и . NBiS, стр. 321-326. IEEE Computer Society, (2009)POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan., , и . CCS, стр. 1433-1435. ACM, (2014)A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study., , , , , и . Int. J. Inf. Sec., 16 (5): 459-473 (2017)