From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm., , , и . ICC, стр. 1-6. IEEE, (2009)Combining multiresolution and random projections for robust statistical analysis and anomaly detection., , , и . AINTEC, стр. 1-2. ACM, (2009)Simple but efficient collaboration in a complex competitive situation., , , , , и . AAMAS, стр. 1042-1043. ACM, (2003)Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining., , и . AINTEC, стр. 54-61. ACM, (2018)Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns., , и . AINTEC, стр. 38-45. ACM, (2018)Layer-1 Bandwidth on Demand Services in SINET3., , , , , , , , , и 1 other автор(ы). GLOBECOM, стр. 2286-2291. IEEE, (2007)Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory., , , и . TMA, том 6003 из Lecture Notes in Computer Science, стр. 101-114. Springer, (2010)Towards detecting DNSSEC validation failure with passive measurements., , и . NOMS, стр. 1-6. IEEE, (2020)Mining Causality of Network Events in Log Data., , , и . IEEE Trans. Netw. Serv. Manag., 15 (1): 53-67 (2018)How Collective Intelligence Emerge in Complex Environment?, , , , , и . BioADIT, том 3141 из Lecture Notes in Computer Science, стр. 484-495. Springer, (2004)