From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical network security: experiences with ntop., и . Comput. Networks, 34 (6): 873-880 (2000)Enforcing Security in IoT and Home Networks., и . ITASEC, том 2058 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)Monitoring Networks Using Ntop., , и . Integrated Network Management, стр. 199-212. IEEE, (2001)Roaring Bitmaps: Implementation of an Optimized Software Library., , , , , , и . CoRR, (2017)Enabling Mobile Network Managers., , , и . Comput. Networks, 29 (8-13): 1417-1428 (1997)Roaring bitmaps: Implementation of an optimized software library., , , , , , и . Softw. Pract. Exp., 48 (4): 867-895 (2018)N2N: A Layer Two Peer-to-Peer VPN., и . AIMS, том 5127 из Lecture Notes in Computer Science, стр. 53-64. Springer, (2008)Graph theoretical models of DNS traffic., , , и . IWCMC, стр. 1162-1167. IEEE, (2013)An Architecture for Distributing and Enforcing IoT Security at the Network Edge., и . iThings/GreenCom/CPSCom/SmartData, стр. 211-218. IEEE, (2018)Realtime High-Speed Network Traffic Monitoring Using ntopng., , и . LISA, стр. 70-80. USENIX Association, (2014)