From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stateful Intrusion Detection for High-Speed Networks., , , и . S&P, стр. 285-293. IEEE Computer Society, (2002)Bayesian Event Classification for Intrusion Detection., , , и . ACSAC, стр. 14-23. IEEE Computer Society, (2003)Composable Tools For Network Discovery and Security Analysis., , , и . ACSAC, стр. 14-24. IEEE Computer Society, (2002)On the Detection of Anomalous System Call Arguments., , , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 326-343. Springer, (2003)Designing and implementing a family of intrusion detection systems., , и . ESEC / SIGSOFT FSE, стр. 88-97. ACM, (2003)Are your votes really counted?: testing the security of real-world electronic voting systems., , , , , , , и . ISSTA, стр. 237-248. ACM, (2008)Static Disassembly of Obfuscated Binaries., , , и . USENIX Security Symposium, стр. 255-270. USENIX, (2004)An anomaly-driven reverse proxy for web applications., , , и . SAC, стр. 361-368. ACM, (2006)Using Hidden Markov Models to Evaluate the Risks of Intrusions., , , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 145-164. Springer, (2006)A Learning-Based Approach to the Detection of SQL Attacks., , и . DIMVA, том 3548 из Lecture Notes in Computer Science, стр. 123-140. Springer, (2005)