From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Real-Time Remote Attestation with Privacy Protection., и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 81-92. Springer, (2010)Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , и . ICTAI, стр. 947-954. IEEE, (2019)AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities., , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 341-356. Springer, (2019)DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting., , , , и . SecureComm (1), том 398 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-24. Springer, (2021)AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs., , , , , , и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 510-528. Springer, (2022)Towards Heap-Based Memory Corruption Discovery., , , и . MSN, стр. 502-511. IEEE, (2021)Real-time remote attestation of IaaS cloud., , и . CCIS, стр. 292-297. IEEE, (2012)Towards Open World Traffic Classification., , , , и . ICICS (1), том 12918 из Lecture Notes in Computer Science, стр. 331-347. Springer, (2021)Building Trust in Container Environment., , , , , и . TrustCom/BigDataSE, стр. 1-9. IEEE, (2019)HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks., , , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 165-180. Springer, (2019)