From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Geometric spanners with small chromatic number., , , , , и . Comput. Geom., 42 (2): 134-146 (2009)Automatic Evaluation of Intrusion Detection Systems., , , , и . ACSAC, стр. 361-370. IEEE Computer Society, (2006)On a Family of Strong Geometric Spanners That Admit Local Routing Strategies., , , , и . WADS, том 4619 из Lecture Notes in Computer Science, стр. 300-311. Springer, (2007)Navigating and visualizing the malware intelligence space., , , и . IEEE Netw., 26 (6): 19-25 (2012)Incremental Construction of k-Dominating Sets in Wireless Sensor Networks., , , и . Ad Hoc Sens. Wirel. Networks, 5 (1-2): 47-68 (2008)Incremental Construction of k-Dominating Sets in Wireless Sensor Networks., , , и . OPODIS, том 4305 из Lecture Notes in Computer Science, стр. 202-214. Springer, (2006)Spanners of Complete $k$-Partite Geometric Graphs, , , , , и . CoRR, (2007)Exploring network-based malware classification., , и . MALWARE, стр. 14-20. IEEE Computer Society, (2011)Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , и . PST, (2005)Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security., и . BADGERS@EuroSys, стр. 19-28. ACM, (2011)