From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revealing and analysing modem malware., , и . ICC, стр. 971-975. IEEE, (2012)Improving Anomaly Detection Error Rate by Collective Trust Modeling., , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 398-399. Springer, (2008)High-Performance Agent System for Intrusion Detection in Backbone Networks., , , , , , и . CIA, том 4676 из Lecture Notes in Computer Science, стр. 134-148. Springer, (2007)Collaborative Attack Detection in High-Speed Networks., , , , , и . CEEMAS, том 4696 из Lecture Notes in Computer Science, стр. 73-82. Springer, (2007)High-Speed Network Traffic Acquisition for Agent Systems., , , и . IAT, стр. 477-480. IEEE Computer Society, (2007)Optimizing flow sampling for network anomaly detection., , и . IWCMC, стр. 1304-1309. IEEE, (2011)Functional Brain Imaging with Multi-objective Multi-modal Evolutionary Optimization., и . PPSN, том 4193 из Lecture Notes in Computer Science, стр. 382-391. Springer, (2006)Agent-Based Network Intrusion Detection System., , , и . IAT, стр. 528-531. IEEE Computer Society, (2007)NetFlow Based Network Protection., и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 543-546. Springer, (2011)Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes., , , , , и . Int. J. Electron. Secur. Digit. Forensics, 2 (1): 35-48 (2009)