From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures., , , , и . CSET, USENIX Association, (2008)DNS-Based Defense against IP Spoofing Attacks., , и . ICONIP (5), том 7667 из Lecture Notes in Computer Science, стр. 599-609. Springer, (2012)Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection., , , и . ICISSP, стр. 471-478. SciTePress, (2019)Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , и . J. Inf. Process., (2023)INTERCEPT+: SDN Support for Live Migration-Based Honeypots., , , и . BADGERS@RAID, стр. 16-24. IEEE, (2015)RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET., , и . PerCom Workshops, стр. 87-92. IEEE Computer Society, (2015)Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App., , , , , и . ICICS, том 12282 из Lecture Notes in Computer Science, стр. 223-242. Springer, (2020)PhishCage: reproduction of fraudulent websites in the emulated internet., , , и . SimuTools, стр. 242-247. ICST/ACM, (2013)New LDoS Attack in Zigbee Network and its Possible Countermeasures., , , и . SMARTCOMP, стр. 246-251. IEEE, (2021)EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , и . BADGERS@ESORICS, стр. 56-65. IEEE, (2014)