From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ALT-Based Route Planning in Dynamic Time-Dependent Road Networks., , , и . MLMI, стр. 35-39. ACM, (2019)Improved Secure Lightweight RFID Authentication Protocol., , , , , и . MLMI, стр. 127-132. ACM, (2020)A Framework for Document-level Cybersecurity Event Extraction from Open Source Data., , , , , , и . CSCWD, стр. 422-427. IEEE, (2021)DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence., , , , , , , , и . TrustCom, стр. 1842-1848. IEEE, (2020)Towards Comprehensive Detection of DNS Tunnels., , , , , и . ISCC, стр. 1-7. IEEE, (2020)A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification., , , , и . ICPR, стр. 3775-3782. IEEE, (2020)TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*., , , , , , , и . COMPSAC, стр. 272-279. IEEE, (2022)Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests., , , , , и . CSCWD, стр. 391-396. IEEE, (2021)Attack Detection by Rough Set Theory in Recommendation System., , и . GrC, стр. 692-695. IEEE Computer Society, (2010)Towards Network Anomaly Detection Using Graph Embedding., , , , , и . ICCS (4), том 12140 из Lecture Notes in Computer Science, стр. 156-169. Springer, (2020)