From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Size-Based Flow-Scheduling Using Spike-Detection., , и . ASMTA, том 6751 из Lecture Notes in Computer Science, стр. 331-345. Springer, (2011)Detection of Syn Flooding Attacks using Linear Prediction Analysis., , и . ICON, стр. 1-6. IEEE, (2006)Dynamic embedding of virtual networks in hybrid optical-electrical datacenters., , , и . ICCCN, стр. 1-8. IEEE, (2014)Accurate in-network file-type classification., , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 139-146. IOS Press, (2016)Opportunistic Piggyback Marking for IP Traceback., , , и . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)SLIC: Self-Learning Intelligent Classifier for network traffic., , , и . Comput. Networks, (2015)Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages., , , , , , , , и . USENIX Security Symposium, стр. 3793-3810. USENIX Association, (2021)In-network defense against AR-DDoS attacks., , , и . SIGCOMM Posters and Demos, стр. 18-20. ACM, (2020)ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification., , , и . CoRR, (2023)iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications., , , , и . Proc. Priv. Enhancing Technol., 2023 (2): 206-220 (апреля 2023)