From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment., и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 74-82. Springer, (2006)Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network., , , , , и . FGCN (2), стр. 559-564. IEEE Computer Society, (2007)Modeling of Network Intrusions Based on the Multiple Transition Probability., , , и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 278-291. Springer, (2006)A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence., , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 201-210. Springer, (2008)Android platform based linux kernel rootkit., и . MALWARE, стр. 79-87. IEEE Computer Society, (2011)Expert System Using Fuzzy Petri Nets in Computer Forensics., , и . ICHIT, том 4413 из Lecture Notes in Computer Science, стр. 312-322. Springer, (2006)An Efficient Similarity Measure for Clustering of Categorical Sequences., , , и . Australian Conference on Artificial Intelligence, том 4304 из Lecture Notes in Computer Science, стр. 372-382. Springer, (2006)Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , и . IWSEC, том 9836 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2016)Detecting P2P Botnets Using a Multi-phased Flow Model., , , , и . ICDS, стр. 247-253. IEEE Computer Society, (2009)A fuzzy logic based expert system as a network forensics., , и . FUZZ-IEEE, стр. 879-884. IEEE, (2004)