From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99., , и . PST, (2005)On the Contribution of Preamble to Information Hiding in Mimicry Attacks., и . AINA Workshops (1), стр. 632-638. IEEE Computer Society, (2007)Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?, и . PST, стр. 213-223. IEEE Computer Society, (2008)Generating Representative Traffic for Intrusion Detection System Benchmarking., и . CNSR, стр. 112-117. IEEE Computer Society, (2005)Generating mimicry attacks using genetic programming: A benchmarking study., , , и . CICS, стр. 136-143. IEEE, (2009)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , и . Appl. Soft Comput., 11 (7): 4366-4383 (2011)Automatically Evading IDS Using GP Authored Attacks., , и . CISDA, стр. 153-160. IEEE, (2007)A Case Study of Three Open Source Security Management Tools., и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 101-104. Kluwer, (2003)A methodology for empirical analysis of permission-based security models and its application to android., , , и . ACM Conference on Computer and Communications Security, стр. 73-84. ACM, (2010)Evolving Buffer Overflow Attacks with Detector Feedback., , и . EvoWorkshops, том 4448 из Lecture Notes in Computer Science, стр. 11-20. Springer, (2007)