From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game Theoretical Adaptation Model for Intrusion Detection System., , , , и . PAAMS, том 155 из Advances in Intelligent and Soft Computing, стр. 201-210. Springer, (2012)Game Theoretical Model for Adaptive Intrusion Detection System., , , , и . Trans. Computational Collective Intelligence, (2014)Dynamic information source selection for intrusion detection systems., , , , , и . AAMAS (2), стр. 1009-1016. IFAAMAS, (2009)Adaptive Multiagent System for Network Traffic Monitoring., , , , , и . IEEE Intelligent Systems, 24 (3): 16-25 (2009)Using Behavioral Similarity for Botnet Command-and-Control Discovery., , , , и . IEEE Intell. Syst., 31 (5): 16-22 (2016)Game-theoretic Approach to Adversarial Plan Recognition., , , , и . ECAI, том 242 из Frontiers in Artificial Intelligence and Applications, стр. 546-551. IOS Press, (2012)Multiple Instance Learning for Malware Classification., , и . CoRR, (2017)Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper., , , , и . PAAMS, том 155 из Advances in Intelligent and Soft Computing, стр. 291-294. Springer, (2012)An empirical comparison of botnet detection methods., , , и . Comput. Secur., (2014)On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System., , и . IAT, стр. 196-203. IEEE Computer Society, (2011)978-0-7695-4513-4.