From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Investigating the trade-off between overhead and delay for full packet traffic privacy., и . ICC Workshops, стр. 1345-1350. IEEE, (2013)What are you Googling? - Inferring search type information through a statistical classifier., , и . GLOBECOM, стр. 747-753. IEEE, (2013)A Neural Attention Model for Real-Time Network Intrusion Detection., , , и . LCN, стр. 291-299. IEEE, (2019)Padding and Fragmentation for Masking Packet Length Statistics., и . TMA, том 7189 из Lecture Notes in Computer Science, стр. 85-88. Springer, (2012)Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques., , , и . Networking, том 5550 из Lecture Notes in Computer Science, стр. 182-194. Springer, (2009)On packet loss modeling: An empirical assessment., , и . NOF, стр. 33-39. IEEE, (2017)ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT., , , , , , , , , и 1 other автор(ы). GIOTS, том 13533 из Lecture Notes in Computer Science, стр. 348-359. Springer, (2022)Network Flow Watermarking: A Survey., и . IEEE Commun. Surv. Tutorials, 19 (1): 512-530 (2017)Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers., и . CoRR, (2023)From ideality to practicability in statistical packet features masking., и . IWCMC, стр. 456-462. IEEE, (2012)