From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Format-Aware Reducer for Scriptable Rewriting of PDF Files., , , и . SP (Workshops), стр. 136-151. IEEE, (2022)Detecting Disruptive Routers: A Distributed Network Monitoring Approach., , , , и . S&P, стр. 115-124. IEEE Computer Society, (1998)A Functional Perspective on Machine Learning via Programmable Induction and Abduction., , , , и . FLOPS, том 10818 из Lecture Notes in Computer Science, стр. 84-98. Springer, (2018)A Lower Bound for Permutation Routing on Two-Dimensional Bused Meshes., и . Inf. Process. Lett., 45 (5): 225-228 (1993)Automatic analysis of firewall and network intrusion detection system configurations., и . FMSE, стр. 66-74. ACM, (2004)Protecting routing infrastructures from denial of service using cooperative intrusion detection., и . NSPW, стр. 94-106. ACM, (1997)Securing the Software Defined Network Control Layer., , , , и . NDSS, The Internet Society, (2015)Mesh Permutation Routing with Locality., и . Inf. Process. Lett., 43 (2): 101-105 (1992)StegoTorus: a camouflage proxy for the Tor anonymity system., , , , , , и . CCS, стр. 109-120. ACM, (2012)An Architecture for an Adaptive Intrusion-Tolerant Server, , , , , , , , и . Security Protocols Workshop, (2002)