From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , и . SIN, стр. 111-118. ACM, (2011)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , и . SocProS (2), том 131 из Advances in Intelligent and Soft Computing, стр. 305-315. Springer, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , и . AST/UCMA/ISA/ACN, том 6059 из Lecture Notes in Computer Science, стр. 129-142. Springer, (2010)An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks., , , , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 294-308. Springer, (2011)Eye center localization and detection using radial mapping., , , , и . ICIP, стр. 3121-3125. IEEE, (2016)An Active Detection Mechanism for Detecting ICMP Based Attacks., , , , и . TrustCom, стр. 51-58. IEEE Computer Society, (2012)ABARUAH at SemEval-2019 Task 5 : Bi-directional LSTM for Hate Speech Detection., , и . SemEval@NAACL-HLT, стр. 371-376. Association for Computational Linguistics, (2019)IIITG-ADBU at SemEval-2020 Task 12: Comparison of BERT and BiLSTM in Detecting Offensive Language., , , и . SemEval@COLING, стр. 1562-1568. International Committee for Computational Linguistics, (2020)IIITG-ADBU at SemEval-2020 Task 9: SVM for Sentiment Analysis of English-Hindi Code-Mixed Text., , , и . SemEval@COLING, стр. 946-950. International Committee for Computational Linguistics, (2020)An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics., , и . CSS, том 7672 из Lecture Notes in Computer Science, стр. 139-152. Springer, (2012)