From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Trust Model In Detecting Final-Phase Attacks in Substations., , и . PST, стр. 1-11. IEEE, (2021)Intrusion Traffic Detection and Characterization using Deep Image Learning., , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 55-62. IEEE, (2020)Security Evaluation for Graphical Password., , , и . DICTAP (1), том 166 из Communications in Computer and Information Science, стр. 431-444. Springer, (2011)A Detailed Analysis of the CICIDS2017 Data Set., , и . ICISSP (Revised Selected Papers), том 977 из Communications in Computer and Information Science, стр. 172-188. Springer, (2018)NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction., , и . Comput. Secur., (2025)Classifying Malicious Domains using DNS Traffic Analysis., , , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 60-67. IEEE, (2021)A Secure Recognition Based Graphical Password by Watermarking., , и . CIT, стр. 164-170. IEEE Computer Society, (2011)Evaluating Label Flipping Attack in Deep Learning-Based NIDS., , и . SECRYPT, стр. 597-603. SCITEPRESS, (2023)Android mobile augmented reality application based on different learning theories for primary school children., , , , , и . ICMCS, стр. 404-408. IEEE, (2012)QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution., , и . IEEE Access, (2022)