From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CAS: Content Attribution System for Network Forensics., , , , и . ISCTCS, том 520 из Communications in Computer and Information Science, стр. 129-136. Springer, (2014)A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash., , , и . ICC, стр. 1-7. IEEE, (2019)A Multi-Level Analysis Framework in Network Security Situation Awareness., , и . ITQM, том 17 из Procedia Computer Science, стр. 530-536. Elsevier, (2013)A Bigram based Real Time DNS Tunnel Detection Approach., , , , и . ITQM, том 17 из Procedia Computer Science, стр. 852-860. Elsevier, (2013)Towards misdirected email detection based on multi-attributes., , , , и . ISCC, стр. 796-802. IEEE Computer Society, (2015)2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks., , , , , и . ISCC, стр. 1-7. IEEE, (2020)PrUE: Distilling Knowledge from Sparse Teacher Networks., , , и . ECML/PKDD (3), том 13715 из Lecture Notes in Computer Science, стр. 102-117. Springer, (2022)Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , и . DSC, стр. 91-98. IEEE, (2021)Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web., , , и . DSC, стр. 76-82. IEEE, (2021)An automatic approach to extract the formats of network and security log messages., , , , и . MILCOM, стр. 1542-1547. IEEE, (2015)