From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method for detecting botnets in IT infrastructure using a neural network., , , , и . ICyberPhyS, том 3736 из CEUR Workshop Proceedings, стр. 282-292. CEUR-WS.org, (2024)Proof of stake and Proof of work approach for malware detection technologies., , и . IntelITSIS, том 3156 из CEUR Workshop Proceedings, стр. 432-441. CEUR-WS.org, (2022)Technique for IoT Cyberattacks Detection Based on the Energy Consumption Analysis., , , , и . IntelITSIS, том 2853 из CEUR Workshop Proceedings, стр. 514-526. CEUR-WS.org, (2021)The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining., , , , , , и . IDAACS, стр. 779-784. IEEE, (2021)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , и . DESSERT, стр. 1-6. IEEE, (2023)Blockchain-based Deep Learning Algorithm for Detecting Malware., , , , и . IntelITSIS, том 3373 из CEUR Workshop Proceedings, стр. 529-538. CEUR-WS.org, (2023)Methods for Detecting Software Implants in Corporate Networks., , , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 270-284. CEUR-WS.org, (2024)Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 208-218. CEUR-WS.org, (2020)