From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics., , и . ICC, стр. 1-6. IEEE, (2011)Identification of anomalies on encrypted communications based on multi-scale behavior modeling., , , и . ICUMT, стр. 1-7. IEEE, (2011)A multi-variate classification approach for the detection of illicit traffic., , и . SoftCOM, стр. 1-6. IEEE, (2011)Classification of Hidden Users' Profiles in Wireless Communications., , и . MONAMI, том 97 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-16. Springer, (2011)A real-time traffic classification approach., , и . ICITST, стр. 620-626. IEEE, (2011)Using multiscale traffic analysis to detect WPS attacks., , , и . ICC Workshops, стр. 1020-1025. IEEE, (2013)Discriminating Internet Applications based on Multiscale Analysis., , и . NGI, стр. 1-7. IEEE, (2009)A Facebook event collector framework for profile monitoring purposes., , , , и . ISCC, стр. 1-6. IEEE Computer Society, (2014)Implementing and evaluating improved MAC efficiency through payload extension in 802.11n networks., , и . ICC Workshops, стр. 982-987. IEEE, (2013)Automatic Topic Segmentation for Video Lectures Using Low and High-Level Audio Features., и . WebMedia, стр. 189-196. ACM, (2018)