From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating anycast in the domain name system., , и . INFOCOM, стр. 1681-1689. IEEE, (2013)A Cloud Provider's View of EDNS Client-Subnet Adoption., , и . TMA, стр. 129-136. IEEE, (2019)Least-Squares Zero-Forcing User-Ordered Successive Interference Cancellation for Multi-User STBC Systems., , , и . IEICE Trans. Electron., 88-C (12): 2330-2337 (2005)Selecting representative IP addresses for internet topology studies., и . Internet Measurement Conference, стр. 411-423. ACM, (2010)Long-Term Study of Honeypots in a Public Cloud., , , , , , , , и . DSN (Supplements), стр. 1-4. IEEE, (2022)A new fault-tolerance motor with decoupled reluctance channel and PM channel., , , , , , и . ISIE, стр. 214-219. IEEE, (2017)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , и . ICYCS, стр. 2198-2203. IEEE Computer Society, (2008)Assessing Affinity Between Users and CDN Sites., , и . TMA, том 9053 из Lecture Notes in Computer Science, стр. 95-110. Springer, (2015)Mapping the expansion of Google's serving infrastructure., , , , , и . Internet Measurement Conference, стр. 313-326. ACM, (2013)Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud., , , , и . CoRR, (2019)