From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , и . ICCCN, стр. 1-8. IEEE, (2017)Finding Logical Consequences Using Unskolemization., и . ISMIS, том 689 из Lecture Notes in Computer Science, стр. 255-264. Springer, (1993)Insider attack detection using weak indicators over network flow data., , , , , и . MILCOM, стр. 1-6. IEEE, (2015)Leveraging social network for predicting demand and estimating available resources for communication network management., , , , и . Integrated Network Management, стр. 547-554. IEEE, (2011)Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems., , , , , и . MILCOM, стр. 993-998. IEEE, (2022)Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples., , и . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, том 11329 из Lecture Notes in Computer Science, стр. 16-29. Springer, (2018)Measuring the Effectiveness of Network Deception., , , , , , и . ISI, стр. 142-147. IEEE, (2018)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , и . POLICY, стр. 102-105. IEEE Computer Society, (2009)DRAMA: Distributed Policy Management for MANETs., и . POLICY, стр. 235-237. IEEE Computer Society, (2008)Policy-Based Mobile Ad Hoc Network Management., , , , , , и . POLICY, стр. 35-44. IEEE Computer Society, (2004)