From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 239-251. CEUR-WS.org, (2020)Methods for Detecting Software Implants in Corporate Networks., , , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 270-284. CEUR-WS.org, (2024)K-means Clustering of Honeynet Data with Unsupervised Representation Learning., и . IntelITSIS, том 2853 из CEUR Workshop Proceedings, стр. 439-449. CEUR-WS.org, (2021)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , и . DESSERT, стр. 1-6. IEEE, (2023)Distributed System for Predicting Malicious Activity in Computer Networks., , , , и . IntelITSIS, том 3373 из CEUR Workshop Proceedings, стр. 401-410. CEUR-WS.org, (2023)A method for detecting botnets in IT infrastructure using a neural network., , , , и . ICyberPhyS, том 3736 из CEUR Workshop Proceedings, стр. 282-292. CEUR-WS.org, (2024)Self-organized distributed anomaly detection system in computer systems based on the principal components method., , , и . IntelITSIS, том 3156 из CEUR Workshop Proceedings, стр. 329-351. CEUR-WS.org, (2022)Malware Detection Tool Based on Emulator State Analysis., , , и . IDAACS, стр. 135-140. IEEE, (2023)The Hardware and Software Part of a Distributed Decentralized Systems Detection Malicious Software., , , , и . IntelITSIS, том 3373 из CEUR Workshop Proceedings, стр. 437-451. CEUR-WS.org, (2023)Method of Ensuring the Failure Resistance of Specialized Information Technologies Under the Influence of Malicious Software., , , и . IntelITSIS, том 3156 из CEUR Workshop Proceedings, стр. 352-364. CEUR-WS.org, (2022)