From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection., , , и . IEEE Trans. Inf. Forensics Secur., 8 (3): 500-509 (2013)PageRank in malware categorization., , , и . RACS, стр. 291-295. ACM, (2015)A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems., , , , и . ISGT, стр. 1-5. IEEE, (2020)Detecting packed executables using steganalysis., , , и . EUVIP, стр. 1-5. IEEE, (2014)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , и . SECRYPT, стр. 327-335. SciTePress, (2016)PageRank in Malware Categorization., , , и . CoRR, (2016)N-opcode analysis for android malware classification and categorization., , , и . Cyber Security And Protection Of Digital Services, стр. 1-7. IEEE, (2016)Policy-Based Profiles for Network Intrusion Response Systems., , и . CSR, стр. 279-286. IEEE, (2022)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , и . VTC2023-Spring, стр. 1-6. IEEE, (2023)Intelligent Sensor Information System For Public Transport - To Safely Go..., , , , , , , , , и . AVSS, стр. 533-538. IEEE Computer Society, (2010)