From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Planning for a Deep Space Communications Station., , , и . ICRA, стр. 1410-1417. IEEE Robotics and Automation Society, (1999)Automating Mimicry Attacks Using Static Binary Analysis., , , , и . USENIX Security Symposium, USENIX Association, (2005)Efficient Heuristic Hypothesis Ranking., , и . J. Artif. Intell. Res., (1999)Using Artificial Intelligence Planning to Generate Antenna Tracking Plans., , , и . AAAI/IAAI, стр. 856-863. AAAI Press / The MIT Press, (1999)An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems., , и . ACSAC, стр. 374-383. IEEE Computer Society, (2003)Bayesian Event Classification for Intrusion Detection., , , и . ACSAC, стр. 14-23. IEEE Computer Society, (2003)Toward developing reusable software components for robotic applications., , , , , и . IROS, стр. 2375-2383. IEEE, (2001)Exploiting Execution Context for the Detection of Anomalous System Calls., , , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2007)Anomalous system call detection., , , и . ACM Trans. Inf. Syst. Secur., 9 (1): 61-93 (2006)On the Detection of Anomalous System Call Arguments., , , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 326-343. Springer, (2003)