From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Crafting adversarial input sequences for recurrent neural networks., , , и . MILCOM, стр. 49-54. IEEE, (2016)Identifying Key Cyber-Physical Terrain., и . IWSPA@CODASPY, стр. 23-28. ACM, (2017)Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection., и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 36-47. Springer, (2016)Source Code Authorship Attribution Using Long Short-Term Memory Based Networks., , , , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 65-82. Springer, (2017)Grammatical Inference and Language Frameworks for LANGSEC., и . IEEE Symposium on Security and Privacy Workshops, стр. 88-98. IEEE Computer Society, (2015)Measuring and Improving the Effectiveness of Defense-in-Depth Postures., , и . ICSS, стр. 15-22. ACM, (2016)Slowing the spread of Bluetooth-based malware in mobile tactical networks., , и . MILCOM, стр. 485-490. IEEE, (2016)Identification of anomalous network security token usage via clustering and density estimation., и . CISS, стр. 1-6. IEEE, (2012)Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments., , , , , , и . Proc. Priv. Enhancing Technol., 2019 (3): 389-408 (2019)SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection., и . CoRR, (2020)