From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices., , , и . NetSoft, стр. 145-149. IEEE, (2020)Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware., и . Sensors, 21 (4): 1140 (2021)TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud., , , , и . CODASPY, стр. 39-48. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting., и . ISCC, стр. 764-770. IEEE, (2023)Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures., , и . CAMAD, стр. 1-6. IEEE, (2020)CyberSure: A Framework for Liability Based Trust., , , , и . IOSec/MSTEC/FINSEC@ESORICS, том 11981 из Lecture Notes in Computer Science, стр. 19-34. Springer, (2019)Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis., , , и . WWW, стр. 1933-1944. ACM, (2024)Network Intrusion Detection in Encrypted Traffic., , и . DSC, стр. 1-8. IEEE, (2022)Scheduling of Multiple Network Packet Processing Applications using Pythia., , , и . CoRR, (2022)