From post

Statistical Approach to Trace the Source of Attack Based on the Variability in Data Flows.

, , и . ICTCSDM, том 10398 из Lecture Notes in Computer Science, стр. 392-400. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Statistical Approach to Trace the Source of Attack Based on the Variability in Data Flows., , и . ICTCSDM, том 10398 из Lecture Notes in Computer Science, стр. 392-400. Springer, (2016)DigitalWatering Hole Attack DetectionUsing Sequential Pattern., и . J. Cyber Secur. Mobil., 7 (1-2): 1-12 (2018)