From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

P2P botnet detection using behavior clustering & statistical tests., и . AISec, стр. 23-30. ACM, (2009)A testbed for evaluation and analysis of stepping stone attack attribution techniques., , , , , , и . TRIDENTCOM, IEEE, (2006)Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems., , и . SecureComm, том 106 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 328-348. Springer, (2012)Node Behavior Based Fast Malware Detection for Enterprise Networks., и . GLOBECOM, стр. 1-5. IEEE, (2010)Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance., , и . SecureComm, стр. 219-221. IEEE, (2005)A functional reference model of passive systems for tracing network traffic.. Digital Investigation, 1 (1): 69-81 (2004)Physical-Layer Identification of Wired Ethernet Devices., , , и . IEEE Trans. Inf. Forensics Secur., 7 (4): 1339-1353 (2012)Xen worlds: leveraging virtualization in distance education., , и . ITiCSE, стр. 293-297. ACM, (2009)Correlation Based Node Behavior Profiling for Enterprise Network Security., и . SECURWARE, стр. 298-305. IEEE Computer Society, (2009)Reference models for network data anonymization., и . NDA, стр. 41-48. ACM, (2008)