From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A clustering-based method for intrusion detection in web servers., и . ICT, стр. 1-5. IEEE, (2013)Intrusion Detection in Virtual Machine Environments., , и . EUROMICRO, стр. 520-525. IEEE Computer Society, (2004)Satellite Imagery-Assisted Link-Budget Analysis Algorithm for Smart Grid Wireless Backhaul Network Planning., , , , , , , и . SAC, стр. 151-158. ACM, (2024)A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support., и . NOMS, стр. 926-932. IEEE, (2012)RSVP Policy Control using XACML., , и . POLICY, стр. 87-. IEEE Computer Society, (2004)A RBAC-Based Policy Information Base., , и . POLICY, стр. 171-180. IEEE Computer Society, (2005)A Policy Based Framework for Access Control., , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 47-59. Springer, (2003)An Architecture for On-the-Fly File Integrity Checking., , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 117-126. Springer, (2003)A New SVM-Based Fraud Detection Model for AMI., , , и . SAFECOMP, том 9922 из Lecture Notes in Computer Science, стр. 226-237. Springer, (2016)Dynamic DiffServ Configuration Using COPS-PR., , и . LCN, стр. 458-467. IEEE Computer Society, (2005)