From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems., , и . ISA, том 200 из Communications in Computer and Information Science, стр. 101-110. Springer, (2011)HoneySpam: Honeypots Fighting Spam at the Source., , , и . SRUTI, USENIX Association, (2005)Runtime Prediction Models for Internet-based Systems., , и . MASCOTS, стр. 33-40. IEEE Computer Society, (2008)Security and privacy of location-based services for in-vehicle device systems., , и . HPCS, стр. 841-848. IEEE, (2014)Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning., , , и . NCA, стр. 235-242. IEEE, (2022)A Proposal for Parallel Sparse BLAS., , , и . PARA, том 1184 из Lecture Notes in Computer Science, стр. 166-175. Springer, (1996)Mechanisms for quality of service in Web clusters., , , и . Comput. Networks, 37 (6): 761-771 (2001)DNS Dispatching Algorithms with State Estimators for Scalable Web-Server Clusters., , и . World Wide Web, 2 (3): 101-113 (1999)The Problem of NIDS Evasion in Mobile Networks., , , и . NTMS, стр. 1-6. IEEE, (2011)Analysis of Task Assignment Policies in Scalable Distributed Web-Server Systems., , и . IEEE Trans. Parallel Distributed Syst., 9 (6): 585-600 (1998)