From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users., , , , , и . ESORICS (2), том 9327 из Lecture Notes in Computer Science, стр. 396-414. Springer, (2015)Automatic mapping of valley networks on Mars., и . Comput. Geosci., 33 (6): 728-738 (2007)Adaptive Verifiable Training Using Pairwise Class Similarity., , , , и . CoRR, (2020)IDIoT: Securing the Internet of Things like it's 1994., , и . CoRR, (2017)Tri-Modularization of Firewall Policies., , , , , , и . SACMAT, стр. 37-48. ACM, (2016)Adversaries' Holy Grail: access control analytics., , и . BADGERS@EuroSys, стр. 54-61. ACM, (2011)Detecting Insider Information Theft Using Features from File Access Logs., , , , , и . ESORICS (2), том 8713 из Lecture Notes in Computer Science, стр. 383-400. Springer, (2014)Generating Balanced Classifier-Independent Training Samples from Unlabeled Data., , , и . PAKDD (1), том 7301 из Lecture Notes in Computer Science, стр. 266-281. Springer, (2012)Trading in risk: using markets to improve access control., , и . NSPW, стр. 107-125. ACM, (2008)Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added.. ITEE, стр. 251-260. Springer, (2007)