From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Queryable Lossless Log Database Compression., , , и . KDID, стр. 70-79. Rudjer Boskovic Institute, Zagreb, Croatia, (2003)Computer Log Anomaly Detection Using Frequent Episodes., , и . AIAI, том 296 из IFIP Advances in Information and Communication Technology, стр. 417-422. Springer, (2009)Towards holistic security management through coherent measuring., и . ECSA Companion Volume, стр. 155-161. ACM, (2010)Host-Based Intrusion Detection for Advanced Mobile Devices., и . AINA (2), стр. 72-76. IEEE Computer Society, (2006)