From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Encrypted Malicious Network Traffic using Machine Learning., и . MILCOM, стр. 1-6. IEEE, (2019)Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services., , , и . DSN, стр. 362-373. IEEE Computer Society, (2018)Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning, и . (2022)Towards passive analysis of anycast in global routing: unintended impact of remote peering., , , , , и . Comput. Commun. Rev., 49 (3): 18-25 (2019)Detecting Attacks on IoT Devices using Featureless 1D-CNN., и . CSR, стр. 461-466. IEEE, (2021)Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints., , , и . SP, стр. 1002-1017. IEEE, (2022)An Exploration of ARM System-Level Cache and GPU Side Channels., , , и . ACSAC, стр. 784-795. ACM, (2021)A Comprehensive Measurement-based Investigation of DNS Hijacking., , , , , и . SRDS, стр. 210-221. IEEE, (2021)A network security classifier defense: against adversarial machine learning attacks., и . WiseML@WiSec, стр. 67-73. ACM, (2020)Packet-level traffic measurements from the Sprint IP backbone., , , , , , , , и . IEEE Netw., 17 (6): 6-16 (2003)