From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Unified Modeling and Verification of Network and System Security Configurations., , и . SafeConfig, стр. 3-19. Springer, (2012)Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks., , и . Integrated Network Management, стр. 236-245. IEEE, (2007)Automated Decision Making for Active Cyber Defense: Panel Discussion., , и . SafeConfig@CCS, стр. 59. ACM, (2015)Predicting Zero-day Malicious IP Addresses., , , и . SafeConfig@CCS, стр. 1-6. ACM, (2017)Synthetic security policy generation via network traffic clustering., и . AISec, стр. 45-53. ACM, (2010)Audio transmission over the Internet: experiments and observations., , , и . ICC, стр. 552-556. IEEE, (2003)The Panacea Threat Intelligence and Active Defense Platform., , , , , , , , , и 6 other автор(ы). CoRR, (2020)Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications., , , , , и . Mob. Networks Appl., 18 (5): 697-711 (2013)ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification., , и . SecureComm (1), том 335 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 23-41. Springer, (2020)Sharing end-user negative symptoms for improving overlay network dependability., и . DSN, стр. 275-284. IEEE Computer Society, (2009)