From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network-level polymorphic shellcode detection using emulation., , и . J. Comput. Virol., 2 (4): 257-274 (2007)Scalable Resource Control in Active Networks., , , , и . IWAN, том 1942 из Lecture Notes in Computer Science, стр. 343-357. Springer, (2000)Application of computational intelligence techniques in active networks., , и . SAC, стр. 448-455. ACM, (2001)Flexible network monitoring with FLAME., , , , и . Comput. Networks, 50 (14): 2548-2563 (2006)Emulation-Based Detection of Non-self-contained Polymorphic Shellcode., , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 87-106. Springer, (2007)On the Privacy Risks of Publishing Anonymized IP Network Traces., , и . Communications and Multimedia Security, том 4237 из Lecture Notes in Computer Science, стр. 22-32. Springer, (2006)Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets., , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 130-145. (2006)COVERAGE: detecting and reacting to worm epidemics using cooperation and validation., , , и . Int. J. Inf. Sec., 6 (6): 361-378 (2007)Real-world polymorphic attack detection using network-level emulation., , и . CSIIRW, стр. 21:1-21:3. ACM, (2008)GAS: Overloading a File Sharing Network as an Anonymizing System., , , и . IWSEC, том 4752 из Lecture Notes in Computer Science, стр. 365-379. Springer, (2007)