From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mining interlacing manifolds in high dimensional spaces., , , , и . SAC, стр. 942-949. ACM, (2011)Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery., , и . ICN (2), том 3421 из Lecture Notes in Computer Science, стр. 859-867. Springer, (2005)Packet-multiplexing scheme in MPEG-2 multi-program transport stream transcoder., , , и . ICASSP, стр. 4178. IEEE, (2002)Towards extended virtual presence of the therapist in stroke rehabilitation., , , , , и . ICORR, стр. 1-6. IEEE, (2013)Investigating behavioral differences between IoT malware via function call sequence graphs., , , , и . SAC, стр. 1674-1682. ACM, (2021)Malicious Packet Classification Based on Neural Network Using Kitsune Features., , , , , , и . ISPR, том 1589 из Communications in Computer and Information Science, стр. 306-314. Springer, (2022)SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection., , , , , и . ICC, стр. 4180-4186. IEEE, (2022)Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection., , , , , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 138-145. IEEE, (2021)Combat Security Alert Fatigue with AI-Assisted Techniques., , , и . CSET @ USENIX Security Symposium, стр. 9-16. ACM, (2021)Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering., , , , , , и . COMPSAC, стр. 1552-1557. IEEE, (2023)