From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Synthetic security policy generation via network traffic clustering., и . AISec, стр. 45-53. ACM, (2010)The Panacea Threat Intelligence and Active Defense Platform., , , , , , , , , и 6 other автор(ы). CoRR, (2020)Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications., , , , , и . Mob. Networks Appl., 18 (5): 697-711 (2013)Automated synthesis of resiliency configurations for cyber networks., , , и . CNS, стр. 243-251. IEEE, (2016)Audio transmission over the Internet: experiments and observations., , , и . ICC, стр. 552-556. IEEE, (2003)A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring., , , и . E2EMON, стр. 1-7. IEEE Computer Society, (2007)Automated Decision Making for Active Cyber Defense: Panel Discussion., , и . SafeConfig@CCS, стр. 59. ACM, (2015)Predicting Zero-day Malicious IP Addresses., , , и . SafeConfig@CCS, стр. 1-6. ACM, (2017)Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance., , , и . INFOCOM, стр. 866-874. IEEE, (2007)Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications, , , , , и . Mobile Networks and Applications, (13.07.2011)