From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features., , , и . Sensors, 22 (15): 5633 (2022)The Mirai botnet and the IoT Zombie Armies., , и . MILCOM, стр. 267-272. IEEE, (2017)Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?., , , , , и . SECRYPT, стр. 301-308. SciTePress, (2015)Security, Privacy, and Trust on Internet of Things., , , и . Wirel. Commun. Mob. Comput., (2019)From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks., , и . Future Internet, 16 (4): 137 (апреля 2024)From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection., , , и . ARES, стр. 20:1-20:10. ACM, (2024)TermID: a distributed swarm intelligence-based approach for wireless intrusion detection., , и . Int. J. Inf. Sec., 16 (4): 401-416 (2017)Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset., , , и . IEEE Commun. Surv. Tutorials, 18 (1): 184-208 (2016)Intrusion detection in wireless networks using nature inspired algorithms. University of the Aegean, Greece, (2014)National Archive of PhD Theses: oai:10442/34647.A secure and efficient authentication protocol for passive RFID tags., , и . ISWCS, стр. 36-40. IEEE, (2009)