From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior., , , , и . ARES, стр. 92-101. IEEE Computer Society, (2013)Developments in MLflow: A System to Accelerate the Machine Learning Lifecycle., , , , , , , , , и 8 other автор(ы). DEEM@SIGMOD, стр. 5:1-5:4. ACM, (2020)Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks., , , и . MMM-ACNS, том 7531 из Lecture Notes in Computer Science, стр. 191-202. Springer, (2012)Automatic functionality detection in behavior-based IDS., , , и . MILCOM, стр. 1302-1307. IEEE, (2011)Computer Network Testbed at Binghamton University., , , и . MILCOM, стр. 1146-1151. IEEE, (2011)Accelerating the Machine Learning Lifecycle with MLflow., , , , , , , , , и 2 other автор(ы). IEEE Data Eng. Bull., 41 (4): 39-45 (2018)Colored Petri nets as the enabling technology in intrusion detection systems., , , , и . MILCOM, стр. 1297-1301. IEEE, (2011)Customized Normalcy Profiles for the Detection of Targeted Attacks., , , и . EvoApplications, том 7248 из Lecture Notes in Computer Science, стр. 487-496. Springer, (2012)