From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Token-based Code Clone Detection Technique in a Student's Programming Exercise., , и . BWCCA, стр. 650-655. IEEE, (2012)The Evaluation of an Anomaly Detection System Based on Chi-square Method., , и . AINA Workshops, стр. 708-713. IEEE Computer Society, (2012)Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation., , и . AINA, стр. 97-104. IEEE Computer Society, (2011)Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis., , и . IIH-MSP, стр. 55-58. IEEE Computer Society, (2007)Early DoS/DDoS Detection Method using Short-term Statistics., , и . CISIS, стр. 168-173. IEEE Computer Society, (2010)Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance., , , и . BWCCA, стр. 497-502. IEEE Computer Society, (2014)DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number., , , и . IIH-MSP, стр. 206-209. IEEE Computer Society, (2009)An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm., , , и . BWCCA, стр. 549-554. IEEE Computer Society, (2011)Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method., , и . NBiS, стр. 221-228. IEEE Computer Society, (2011)Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis., , , и . CISIS, стр. 141-147. IEEE Computer Society, (2008)