From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CloudBot: Advanced mobile botnets using ubiquitous cloud technologies., , , , , и . Pervasive Mob. Comput., (2017)Towards more accurate severity prediction and fixer recommendation of software bugs., , , , и . J. Syst. Softw., (2016)Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals., , и . EURASIP J. Adv. Signal Process., (2009)A Centralized Monitoring Infrastructure for Improving DNS Security., , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 18-37. Springer, (2010)ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks., , , , , и . IEEE Internet Things J., 10 (14): 12521-12536 (июля 2023)STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews., , , , , , , и . IEEE Trans. Software Eng., 49 (8): 4135-4151 (августа 2023)Characterizing EOSIO Blockchain., , , , , , , , и . CoRR, (2020)A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation., , , , , и . CoRR, (2022)Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification., , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (5): 3521-3538 (2022)