From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving the performance of passive network monitoring applications with memory locality enhancements., , , , и . Comput. Commun., 35 (1): 129-140 (2012)ASIST: architectural support for instruction set randomization., , , и . ACM Conference on Computer and Communications Security, стр. 981-992. ACM, (2013)LOBSTER: a European platform for passive network traffic monitoring., , , , , и . TRIDENTCOM, стр. 8. ICST, (2008)Proof Explanation for the Semantic Web Using Defeasible Logic, , , , , , , , , и 6 other автор(ы). KSEM 2007, LNAI, (2007)Tolerating Overload Attacks Against Packet Capturing Systems., , и . USENIX ATC, стр. 197-202. USENIX Association, (2012)Improving the Performance of Passive Network Monitoring Applications using Locality Buffering., , , и . MASCOTS, стр. 151-157. IEEE Computer Society, (2007)Improving the accuracy of network intrusion detection systems under load using selective packet discarding., , и . EUROSEC, стр. 15-21. ACM, (2010)Scap: stream-oriented network traffic capture and analysis for high-speed networks., , и . Internet Measurement Conference, стр. 441-454. ACM, (2013)Rise of the planet of the apps: a systematic study of the mobile app ecosystem., , , , и . Internet Measurement Conference, стр. 277-290. ACM, (2013)Building efficient network traffic monitoring systems under heavy load. University of Crete, Greece, (2014)National Archive of PhD Theses: oai:10442/34771.