From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Approach to Autonomizing Legacy Systems, , , , и . Workshop on Self-Healing, Adaptive and Self-MANaged Systems, (июня 2002)A holistic approach to service survivability., , , , , , , и . SSRS@CCS, стр. 11-22. ACM, (2003)An Active Events Model for Systems Monitoring, , , , и . Working Conference on complex and Dynamic Systems Architecture, (2001)Intrusion and anomaly detection model exchange for mobile ad-hoc networks., , , и . CCNC, стр. 635-639. IEEE, (2006)Retrofitting Autonomic Capabilities onto Legacy Systems., , , и . Clust. Comput., 9 (2): 141-159 (2006)Anagram: A Content Anomaly Detector Resistant to Mimicry Attack., , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 226-248. Springer, (2006)Privacy-preserving payload-based correlation for accurate malicious traffic detection., , и . LSAD@SIGCOMM, стр. 99-106. ACM, (2006)Kinesthetics eXtreme: An External Infrastructure for Monitoring Distributed Legacy Systems., , , и . Active Middleware Services, стр. 22-31. IEEE Computer Society, (2003)