From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing Dark DNS Behavior., , и . DIMVA, том 4579 из Lecture Notes in Computer Science, стр. 140-156. Springer, (2007)Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities., , , , , и . IWSPA@CODASPY, стр. 3-9. ACM, (2015)Integrated product and process designenvironment tool for manufacturing T/R modules., , , , , , , , , и . J. Intell. Manuf., 9 (1): 9-15 (1998)The Internet Census 2012 Dataset: An Ethical Examination., , и . IEEE Technol. Soc. Mag., 34 (2): 40-46 (2015)Understanding IPv6 Populations in the Wild., , , и . PAM, том 7799 из Lecture Notes in Computer Science, стр. 256-259. Springer, (2013)Address Resolution Problems in Large Data Center Networks., , и . RFC, (января 2013)BGP-Inspect - Extracting Information from Raw BGP Data., , и . NOMS, стр. 174-185. IEEE, (2006)Characterization of Blacklists and Tainted Network Traffic., , , , и . PAM, том 7799 из Lecture Notes in Computer Science, стр. 218-228. Springer, (2013)Implementing Ad Hoc to Terrestrial Network Gateways., , и . WWIC, том 2957 из Lecture Notes in Computer Science, стр. 132-142. Springer, (2004)Multi-Threaded Routing Toolkit (MRT) Routing Information Export Format., , и . RFC, (октября 2011)