From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reasoning about Evidence using Bayesian Networks., , и . IFIP Int. Conf. Digital Forensics, том 383 из IFIP Advances in Information and Communication Technology, стр. 99-113. Springer, (2012)Forensic-Aware Anti-DDoS Device., и . IEEE Symposium on Security and Privacy Workshops, стр. 148-159. IEEE Computer Society, (2018)A Host-Based Approach to BotNet Investigation?, , , и . ICDF2C, том 31 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 161-170. Springer, (2009)A Cost-Effective Model for Digital Forensic Investigations., , , , и . IFIP Int. Conf. Digital Forensics, том 306 из IFIP Advances in Information and Communication Technology, стр. 231-240. Springer, (2009)An Analysis of the Green Dam Youth Escort Software., , , и . IFIP Int. Conf. Digital Forensics, том 337 из IFIP Advances in Information and Communication Technology, стр. 49-62. Springer, (2010)Detecting anomalous behavior of PLC using semi-supervised machine learning., , , и . CNS, стр. 580-585. IEEE, (2017)Quantification of digital forensic hypotheses using probability theory., , , и . SADFE, стр. 1-5. IEEE, (2013)Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones., , , , , , , и . IFIP Int. Conf. Digital Forensics, том 383 из IFIP Advances in Information and Communication Technology, стр. 129-142. Springer, (2012)Detecting Anomalous Programmable Logic Controller Events Using Process Mining., , и . Critical Infrastructure Protection, том 636 из IFIP Advances in Information and Communication Technology, стр. 119-133. Springer, (2021)Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach., , и . CSE, стр. 146-153. IEEE, (2021)