From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Training genetic programming on half a million patterns: an example from anomaly detection., , и . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Digital library query clearing using clustering and fuzzy decision-making., , и . Inf. Process. Manag., 36 (4): 571-583 (2000)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , и . Appl. Soft Comput., 11 (7): 4366-4383 (2011)A heuristic approach to network optimised mapping of a distributed resource discovery architecture., и . Int. J. Comput. Appl. Technol., 19 (1): 43-50 (2004)Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature., , и . ARES, стр. 124:1-124:9. ACM, (2022)Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels., и . ARES, стр. 72:1-72:7. ACM, (2021)The effect of routing under local information using a social insect metaphor., , и . IEEE Congress on Evolutionary Computation, стр. 1438-1443. IEEE, (2002)Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks., , и . VTC Spring, стр. 1-7. IEEE, (2022)Post-supervised Template Induction for Dynamic Web Sources., , и . AI, том 2671 из Lecture Notes in Computer Science, стр. 268-282. Springer, (2003)Summarizing Web Sites Automatically., , и . AI, том 2671 из Lecture Notes in Computer Science, стр. 283-296. Springer, (2003)