From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , и . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)Performance of a multi-agent system over a multi-core cluster managed by Terracotta., , , и . SpringSim (TMS-DEVS), стр. 125-133. SCS/ACM, (2011)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., и . SIGSIM-PADS, стр. 101-104. ACM, (2018)Using CalcuList To MapReduce Json Documents., и . SEBD, том 2400 из CEUR Workshop Proceedings, CEUR-WS.org, (2019)A cloud based framework for Emergency Management: experiences in Calabria Region., , , , , , , , , и . SEBD, том 2037 из CEUR Workshop Proceedings, стр. 275. CEUR-WS.org, (2017)Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks., , , и . IDCS, том 8729 из Lecture Notes in Computer Science, стр. 263-274. Springer, (2014)A Simulation Model for the Analysis of DDoS Amplification Attacks., , , и . UKSim, стр. 267-272. IEEE, (2015)Integration and Interoperability between Jini services andWeb Services., , и . IEEE SCC, стр. 278-285. IEEE Computer Society, (2007)Toward a Log-based Anomaly Detection System for Cyber Range Platforms., , и . ARES, стр. 115:1-115:9. ACM, (2024)An Agent Infrastructure over HLA for Distributed Simulation of Reconfigurable Systems and its Application to UAV Coordination., , и . Simulation, 85 (1): 17-32 (2009)