From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tracking Phishing Attacks Over Time., , , , и . WWW, стр. 667-676. ACM, (2017)Domain Classifier: Compromised Machines Versus Malicious Registrations., , , , и . ICWE, том 11496 из Lecture Notes in Computer Science, стр. 265-279. Springer, (2019)Recovering Repetitive Sub-functions from Observations., , , и . FORTE, том 4574 из Lecture Notes in Computer Science, стр. 35-49. Springer, (2007)Measuring Improvement of F1-Scores in Detection of Self-Admitted Technical Debt., , , , , и . TechDebt@ICSE, стр. 37-41. IEEE, (2023)Are GNNs the Right Tool to Mine the Blockchain? The Case of the Bitcoin Generator Scam., , , , , и . DSAA, стр. 1-11. IEEE, (2023)Lower bounds on lengths of checking sequences., , , и . Formal Aspects Comput., 22 (6): 667-679 (2010)Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins., , , , , и . IEEE Access, (2024)Using AP-TED to Detect Phishing Attack Variations., , , , , и . PST, стр. 1-6. IEEE Computer Society, (2018)Recovering Representations of Systems with Repetitive Subfunctions from Observations., и . J. Multiple Valued Log. Soft Comput., 27 (2-3): 255-273 (2016)An Extensive Comparison of Systems for Entity Extraction from Log Files., , , и . FPS, том 13291 из Lecture Notes in Computer Science, стр. 376-392. Springer, (2021)