Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)Fast Handoff Scheme Using Location Information., , and . UKSim, page 428-433. IEEE Computer Society, (2008)Taxonomy of Risks posed by Language Models., , , , , , , , , and 13 other author(s). FAccT, page 214-229. ACM, (2022)Non-intrusive drowsiness detection by employing Support Vector Machine., , and . ICAC, page 188-193. IEEE, (2014)Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment., , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 26-41. Springer, (2009)Bi-directional Mapping System as a New IPv4/IPv6 Translation Mechanism., , , and . UKSim, page 40-45. IEEE Computer Society, (2008)Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems., , , , , , and . ISDF, volume 41 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 57-65. Springer, (2009)Improving alignment of dialogue agents via targeted human judgements., , , , , , , , , and 24 other author(s). CoRR, (2022)Characteristics of Harmful Text: Towards Rigorous Benchmarking of Language Models., , , , , , , , , and 2 other author(s). NeurIPS, (2022)