From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feature Interactions in Overlay Networks., , , и . FIW, стр. 91-297. IOS Press, (2005)CyberVAN: A Cyber Security Virtual Assured Network testbed., , , , , , , , , и 2 other автор(ы). MILCOM, стр. 1125-1130. IEEE, (2016)Enabling reproducible cyber research - four labeled datasets., , , , , и . MILCOM, стр. 539-544. IEEE, (2016)Towards the Development of Robust Deep Neural Networks in Adversarial Settings., , , и . MILCOM, стр. 419-424. IEEE, (2018)Testing android devices for tactical networks: A hybrid emulation testbed approach., , , , , и . MILCOM, стр. 489-494. IEEE, (2015)Nature inspired collaborative team autonomy (NICiTA)., , , и . MILCOM, стр. 756-761. IEEE, (2015)Guest editorial - policy-based networking., , и . IEEE Netw., 16 (2): 8-9 (2002)Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems., , , , , и . MILCOM, стр. 874-879. IEEE, (2021)Leveraging social network for predicting demand and estimating available resources for communication network management., , , , и . Integrated Network Management, стр. 547-554. IEEE, (2011)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , и . ICCCN, стр. 1-8. IEEE, (2017)