From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Systematic Mapping of Detection Techniques for Advanced Persistent Threats., , , , и . CISIS, том 1267 из Advances in Intelligent Systems and Computing, стр. 426-435. Springer, (2020)Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection., , , , и . CISIS-ICEUTE, том 1400 из Advances in Intelligent Systems and Computing, стр. 52-61. Springer, (2021)Systematic Literature Review of Methods Used for SQL Injection Detection Based on Intelligent Algorithms., , , и . CISIS-ICEUTE, том 748 из Lecture Notes in Networks and Systems, стр. 59-68. Springer, (2023)Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data., , , , и . CISIS-ICEUTE, том 748 из Lecture Notes in Networks and Systems, стр. 69-78. Springer, (2023)