From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy Awareness: for Software Creators and Users., и . iCAST, стр. 1-4. IEEE, (2019)Network-based Intrusion Detection - Modeling for a Larger Picture., , , , , и . LISA, стр. 227-232. USENIX, (2002)Security by simple network traffic monitoring., и . SIN, стр. 201-204. ACM, (2012)Focus on accuracy and consistency of advanced applications for monitoring the future Internet., и . NOMS, стр. 1-4. IEEE, (2014)Feasibility of societal model for securing Internet of Things., и . IWCMC, стр. 541-546. IEEE, (2017)Improving the Precision and Efficiency of Log-Based IP Packet Traceback., , , и . GLOBECOM, стр. 1823-1827. IEEE, (2007)A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment., , , и . AINA (1), стр. 889-894. IEEE Computer Society, (2006)Analyzing darknet TCP traffic stability at different timescales., , и . ICOIN, стр. 128-133. IEEE, (2018)Management for Mobility-Aware Networks Based on Standardized Protocols., , , и . CISIS, стр. 327-334. IEEE Computer Society, (2009)A New Concept in Ubiquitous Network Management: Guest Node Monitoring--Applications of the MobileIPv6-MIB--., , , и . SAINT, стр. 17. IEEE Computer Society, (2007)