From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study on association rule mining of darknet big data., , , , , и . IJCNN, стр. 1-7. IEEE, (2015)Using Bayesian Decision Making to Detect Slow Scans., , , и . BADGERS@RAID, стр. 32-41. IEEE, (2015)An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers., , , , и . SAINT, стр. 257-260. IEEE Computer Society, (2010)Multipurpose Network Monitoring Platform Using Dynamic Address Assignment., , , и . AsiaJCIS, стр. 79-84. IEEE Computer Society, (2012)nicter: a large-scale network incident analysis system: case studies for understanding threat landscape., , , , , и . BADGERS@EuroSys, стр. 37-45. ACM, (2011)DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks., , , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 381-382. Springer, (2009)A Methodology for Analyzing Overall Flow of Spam-Based Attacks., , , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 556-564. Springer, (2009)A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis., , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 565-572. Springer, (2009)Malware Sandbox Analysis with Efficient Observation of Herder's Behavior., , , , , , и . J. Inf. Process., 20 (4): 835-845 (2012)Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis., , , , и . IEICE Trans. Inf. Syst., 93-D (5): 1106-1116 (2010)