From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mining in a Data-Flow Environment: Experience in Network Intrusion Detection., , и . KDD, стр. 114-124. ACM, (1999)A cooperative intrusion detection system for ad hoc networks., и . SASN, стр. 135-147. ACM, (2003)Environment-Sensitive Intrusion Detection., , , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 185-206. Springer, (2005)A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions., , , , , , и . Recent Advances in Intrusion Detection, том 1907 из Lecture Notes in Computer Science, стр. 49-65. Springer, (2000)Combining Knowledge Discovery and Knowledge Engineering to Build IDSs., и . Recent Advances in Intrusion Detection, (1999)xBook: Redesigning Privacy Control in Social Networking Platforms., , и . USENIX Security Symposium, стр. 249-266. USENIX Association, (2009)ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android., , , , и . ACM Conference on Computer and Communications Security, стр. 1120-1136. ACM, (2018)SURF: detecting and measuring search poisoning., , и . ACM Conference on Computer and Communications Security, стр. 467-476. ACM, (2011)Anomaly Detection Using Call Stack Information, , , , и . #IEEE03#, (2003)Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem., , , , , и . CCS, стр. 2975-2988. ACM, (2022)