From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance., , и . J. Inf. Process., 24 (2): 247-254 (2016)Mining Causality of Network Events in Log Data., , , и . IEEE Trans. Netw. Serv. Manag., 15 (1): 53-67 (2018)Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining., , и . AINTEC, стр. 54-61. ACM, (2018)Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns., , и . AINTEC, стр. 38-45. ACM, (2018)Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory., , , и . TMA, том 6003 из Lecture Notes in Computer Science, стр. 101-114. Springer, (2010)Layer-1 Bandwidth on Demand Services in SINET3., , , , , , , , , и 1 other автор(ы). GLOBECOM, стр. 2286-2291. IEEE, (2007)MARIF: Multiple Queries Look-Up Architecture Using Range Information Feedback in a DHT Network., , , и . IEICE Trans. Commun., 96-B (7): 1680-1690 (2013)Towards detecting DNSSEC validation failure with passive measurements., , и . NOMS, стр. 1-6. IEEE, (2020)A cause of self-similarity in TCP traffic., , и . Int. J. Commun. Syst., 18 (6): 603-617 (2005)Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic., , , , , и . IEEE/ACM Trans. Netw., 21 (4): 1284-1297 (2013)