Search

Your search keyword '"Pavel Laskov"' showing total 17 results

Search Constraints

Start Over You searched for: Author "Pavel Laskov" Remove constraint Author: "Pavel Laskov" Search Limiters Full Text Remove constraint Search Limiters: Full Text
17 results on '"Pavel Laskov"'

Search Results

1. Detection of illicit cryptomining using network metadata

2. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

3. Security of Machine Learning (Dagstuhl Seminar 22281)

4. Detection of illicit cryptomining using network metadata

5. Towards Understanding the Skill Gap in Cybersecurity

6. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

7. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

8. Evasion Attacks against Machine Learning at Test Time

9. [Untitled]

10. Practical Evasion of a Learning-Based Classifier: A Case Study

11. Learning and Classification of Malware Behavior

12. Automatic feature selection for anomaly detection

13. Learning Intrusion Detection: Supervised or Unsupervised?

14. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)

15. 8. 08102 Manifesto – Perspectives Workshop: Network Attack Detection and Defense

16. Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

17. A factorization method for the classification of infrared spectra

Catalog

Books, media, physical & digital resources