From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Editorial for Special Issue on Machine Learning approaches in IoT scenarios., , , и . Comput. Commun., (2022)Host in Danger? Detecting Network Intrusions from Authentication Logs., , , , , и . CNSM, стр. 1-9. IEEE, (2019)A First Look at Generating Website Fingerprinting Attacks via Neural Architecture Search., , , , и . WPES@CCS, стр. 173-178. ACM, (2023)Deep learning for encrypted traffic classification in the face of data drift: An empirical study., , , , , , , и . Comput. Networks, (апреля 2023)A Report on CNSM 2010., , , и . J. Netw. Syst. Manag., 19 (1): 137-142 (2011)Scheduled sampling for robust sensing., и . CNSM, стр. 224-229. IEEE Computer Society, (2014)Traffic classification in an increasingly encrypted web., , , , , , , и . Commun. ACM, 65 (10): 75-83 (2022)A Critical Study of Few-Shot Learning for Encrypted Traffic Classification., , , , , , , , и . CNSM, стр. 1-9. IEEE, (2023)FSTC: Dynamic Category Adaptation for Encrypted Network Traffic Classification., , , , и . IFIP Networking, стр. 1-9. IEEE, (2023)ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning., , , , и . NOMS, стр. 1-9. IEEE, (2020)