From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , и . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , и . CoRR, (2014)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , и . Future Gener. Comput. Syst., (2018)An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0., , , , и . INFOCOM Workshops, стр. 632-637. IEEE, (2019)A multi-protocol framework for the development of collaborative virtual environments., и . CoRR, (2014)A multi-protocol framework for the development of collaborative virtual environments., и . CSCWD, стр. 449-454. IEEE, (2015)Towards Adaptive Access Control., , , , и . DBSec, том 10980 из Lecture Notes in Computer Science, стр. 99-109. Springer, (2018)Using virtual environments for the assessment of cybersecurity issues in IoT scenarios., , , и . Simul. Model. Pract. Theory, (2017)A Simulation-based and Data-driven Framework for Enabling the Analysis and Design of Business Processes based on Blockchain and Smart Contracts Solutions., , , , , и . DLT@ITASEC, том 2580 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)Exploiting N-Gram Location for Intrusion Detection., , и . ICTAI, стр. 1093-1098. IEEE Computer Society, (2015)