From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study on association rule mining of darknet big data., , , , , и . IJCNN, стр. 1-7. IEEE, (2015)Using Bayesian Decision Making to Detect Slow Scans., , , и . BADGERS@RAID, стр. 32-41. IEEE, (2015)An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers., , , , и . SAINT, стр. 257-260. IEEE Computer Society, (2010)Multipurpose Network Monitoring Platform Using Dynamic Address Assignment., , , и . AsiaJCIS, стр. 79-84. IEEE Computer Society, (2012)DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks., , , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 381-382. Springer, (2009)nicter: a large-scale network incident analysis system: case studies for understanding threat landscape., , , , , и . BADGERS@EuroSys, стр. 37-45. ACM, (2011)A Methodology for Analyzing Overall Flow of Spam-Based Attacks., , , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 556-564. Springer, (2009)A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis., , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 565-572. Springer, (2009)A study on cost-effective P2P traffic classification., , , , и . IJCNN, стр. 1-7. IEEE, (2012)DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system., , , , и . VizSEC, стр. 72-79. ACM, (2012)