From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BigBing: Privacy-Preserving Cloud-Based Malware Classification Service., , , и . PAC, стр. 43-54. IEEE, (2018)Debugging Malware Classification Models Based on Event Logs with Explainable AI., , , , , , и . ICDM (Workshops), стр. 939-948. IEEE, (2023)Geography-based analysis of the Internet infrastructure., , и . INFOCOM, стр. 131-135. IEEE, (2011)Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks., , , и . INFOCOM, стр. 657-665. IEEE, (2009)A correlation attack against user mobility privacy in a large-scale WLAN network., , , и . S3@MobiCom, стр. 33-36. ACM, (2010)DDoS Mitigation in Non-cooperative Environments., и . Networking, том 4982 из Lecture Notes in Computer Science, стр. 599-611. Springer, (2008)SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection., , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 202-223. Springer, (2009)Discriminant malware distance learning on structuralinformation for automated malware classification., и . SIGMETRICS, стр. 347-348. ACM, (2013)ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability., , , и . PAC, стр. 164-175. IEEE, (2017)Simulation of Network Traffic at Coarse Timescales., и . PADS, стр. 141-150. IEEE Computer Society, (2005)