From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , и . CoRR, (2014)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , и . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , и . Future Gener. Comput. Syst., (2018)An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0., , , , и . INFOCOM Workshops, стр. 632-637. IEEE, (2019)A multi-protocol framework for the development of collaborative virtual environments., и . CoRR, (2014)A multi-protocol framework for the development of collaborative virtual environments., и . CSCWD, стр. 449-454. IEEE, (2015)A hierarchical hybrid framework for modelling anomalous behaviours., , , и . Simul. Model. Pract. Theory, (2018)Detection, Prevention and Simulation Approaches to Address Anomalies in Cyber Security., , и . SEBD, том 2161 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)Effectiveness of Content Spatial Distribution Analysis in Securing IoT Environments., , и . FiCloud, стр. 41-46. IEEE Computer Society, (2018)TrueDetective 4.0: A Big Data Architecture for Real Time Anomaly Detection., , , , и . ISMIS, том 13515 из Lecture Notes in Computer Science, стр. 449-458. Springer, (2022)