From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model., , , , , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 190-200. Springer, (2008)SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing., , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2005)Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection., , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 25-34. Springer, (2005)Visualization of network components for attack analysis., , , и . CICS, стр. 1-8. IEEE, (2009)Covert Channel Detection in the ICMP Payload Using Support Vector Machine., , , , и . ISCIS, том 2869 из Lecture Notes in Computer Science, стр. 828-835. Springer, (2003)A new approach to deploying private mobile network exploits., и . J. Supercomput., 72 (1): 46-57 (2016)An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing., , , , и . ISCIS, том 3280 из Lecture Notes in Computer Science, стр. 351-362. Springer, (2004)PPF Model with CTNT to Defend Web Server from DDoS Attack., , , , и . EUC Workshops, том 3823 из Lecture Notes in Computer Science, стр. 986-995. Springer, (2005)A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine., , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 313-324. Springer, (2003)An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows., , , , , и . ICIC (1), том 4681 из Lecture Notes in Computer Science, стр. 646-655. Springer, (2007)