From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Bayesian Decision Making to Detect Slow Scans., , , и . BADGERS@RAID, стр. 32-41. IEEE, (2015)A study on association rule mining of darknet big data., , , , , и . IJCNN, стр. 1-7. IEEE, (2015)On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework., , , , и . Proc. Priv. Enhancing Technol., 2022 (4): 140-161 (2022)GHOST Sensor: A Proactive Cyber Attack Monitoring Platform., , , , , и . IEICE Trans. Inf. Syst., 98-D (4): 788-795 (2015)A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data., , , , , и . IEICE Trans. Inf. Syst., 93-D (9): 2544-2554 (2010)An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers., , , , и . SAINT, стр. 257-260. IEEE Computer Society, (2010)Multipurpose Network Monitoring Platform Using Dynamic Address Assignment., , , и . AsiaJCIS, стр. 79-84. IEEE Computer Society, (2012)nicter: a large-scale network incident analysis system: case studies for understanding threat landscape., , , , , и . BADGERS@EuroSys, стр. 37-45. ACM, (2011)Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring., , , и . IEICE Trans. Inf. Syst., 92-D (5): 787-798 (2009)A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads., , , , и . IEICE Trans. Inf. Syst., 94-D (11): 2150-2158 (2011)