From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks., , и . ADHOCNETS, том 28 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 300-315. Springer, (2009)Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users., , и . ANT/MobiWIS, том 5 из Procedia Computer Science, стр. 123-131. Elsevier, (2011)Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers., , и . ISMIS, том 6804 из Lecture Notes in Computer Science, стр. 483-489. Springer, (2011)Next Generation Application-Layer DDoS Defences: Applying the Concepts of Outlier Detection in Data Streams with Concept Drift., и . ICMLA, стр. 456-462. IEEE, (2014)Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior., и . CNS, стр. 490-491. IEEE, (2014)Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation., , , и . CCNC, стр. 1-9. IEEE, (2021)Sink mobility in wireless sensor networks: a (mis)match between theory and practice., и . IWCMC, стр. 386-393. ACM, (2009)Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies., и . LCN, стр. 680-688. IEEE Computer Society, (2008)Detection of malicious and non-malicious website visitors using unsupervised neural network learning., , и . Appl. Soft Comput., 13 (1): 698-708 (2013)