From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts., , , , , и . ICMLA (2), стр. 60-65. IEEE, (2013)978-0-7695-5144-9.ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide)., , , , , и . CoRR, (2020)GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection., , , , и . CISRC, стр. 15:1-15:4. ACM, (2016)NV: Nessus vulnerability visualization for the web., , , , и . VizSEC, стр. 25-32. ACM, (2012)AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors., , , , , , , , , и 4 other автор(ы). IEEE Big Data, стр. 1620-1629. IEEE, (2023)Developing an Ontology for Cyber Security Knowledge Graphs., , , , , , , и . CISR, стр. 12:1-12:4. ACM, (2015)situ: Situational understanding and discovery for cyber attacks., , , , , , и . IEEE VAST, стр. 307-308. IEEE Computer Society, (2012)A Survey of Intrusion Detection Systems Leveraging Host Data., , , , и . CoRR, (2018)Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models., , , , , , , , и . AMSec@CCS, стр. 25-38. ACM, (2022)Integration of external data sources with cyber security data warehouse., , , , и . CISR, стр. 49-52. ACM, (2014)