From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning combination of anomaly detectors for security domain., и . Comput. Networks, (2016)Intelligence, not integration: Distributed regret minimization for IDS Control., , и . CICS, стр. 217-224. IEEE, (2011)Passive NAT detection using HTTP access logs., , и . WIFS, стр. 1-6. IEEE, (2016)Game theoretical adaptation model for intrusion detection system., , , , и . AAMAS, стр. 1123-1124. IFAAMAS, (2011)Network Intrusion Detection by Means of Community of Trusting Agents., , , , и . IAT, стр. 498-504. IEEE Computer Society, (2007)Improving Anomaly Detection Error Rate by Collective Trust Modeling., , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 398-399. Springer, (2008)On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System., , и . IAT, стр. 196-203. IEEE Computer Society, (2011)978-0-7695-4513-4.Exploit Kit Website Detection Using HTTP Proxy Logs., , и . ICNCC, стр. 120-125. ACM, (2016)Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper., , , , и . PAAMS, том 155 из Advances in Intelligent and Soft Computing, стр. 291-294. Springer, (2012)Reducing false positives of network anomaly detection by local adaptive multivariate smoothing., , и . J. Comput. Syst. Sci., 83 (1): 43-57 (2017)