From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Top-k user-specified preferred answers in massive graph databases., , , и . Data Knowl. Eng., (2020)Editorial: Security and privacy for the Internet of Things., , и . Frontiers Comput. Sci., (2023)Optimal Placement of Security Resources for the Internet of Things., , , и . The Internet of Things for Smart Urban Ecosystems, Springer, (2019)A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes., , , и . IDEAL (1), том 12489 из Lecture Notes in Computer Science, стр. 51-63. Springer, (2020)Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications., , и . Data Min. Knowl. Discov., 33 (6): 1736-1774 (2019)Detecting Saturation Attacks in SDN via Machine Learning., , , и . ICCCS, стр. 1-8. IEEE, (2019)A Game of Things: Strategic Allocation of Security Resources for IoT., , , и . IoTDI, стр. 185-190. ACM, (2017)Identifying ATT&CK Tactics in Android Malware Control Flow Graph through Graph Representation Learning and Interpretability (Student Abstract)., , , , и . AAAI, стр. 12941-12942. AAAI Press, (2022)Power Grid Anomaly Detection via Hybrid LSTM-GIN Model (Student Abstract)., , , , , и . AAAI, стр. 23525-23527. AAAI Press, (2024)Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper)., , и . SEBD, том 2994 из CEUR Workshop Proceedings, стр. 347-354. CEUR-WS.org, (2021)