From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study of numerical methods for solving differential equations.. ACM National Meeting, стр. 2:1-2:3. ACM, (1958)Meteorological phenomena in Western classical orchestral music, и . Weather, 66 (11): 300--306 (01.11.2011)CDIS: Towards a Computer Immune System for Detecting Network Intrusions., , , , и . Recent Advances in Intrusion Detection, том 2212 из Lecture Notes in Computer Science, стр. 117-133. Springer, (2001)Cyberspace Policy For Critical Infrastructures., , , и . Critical Infrastructure Protection, том 290 из IFIP Advances in Information and Communication Technology, стр. 17-28. Springer, (2008)The computer defense immune system: current and future research in intrusion detection., , , и . IEEE Congress on Evolutionary Computation, стр. 1027-1032. IEEE, (2002)CuPIDS: Increasing information system security through the use of dedicated co-processing. Purdue University, USA, (2005)Stochastic Climate Theory and Modelling, , , , и . (01.09.2014)Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information., , , и . WISTP, том 5019 из Lecture Notes in Computer Science, стр. 36-48. Springer, (2008)An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions., , , и . ICARIS, том 4628 из Lecture Notes in Computer Science, стр. 420-435. Springer, (2007)Prospects for trachoma elimination through mass treatment targeted at children., , и . SpringSim (ADS), стр. 11. SCS/ACM, (2016)