From post

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.

, , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BareDroid: Large-Scale Analysis of Android Apps on Real Devices., , , , , , , и . ACSAC, стр. 71-80. ACM, (2015)Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security., , , и . SAC, стр. 1649-1656. ACM, (2014)You are what you include: large-scale evaluation of remote javascript inclusions., , , , , , , и . CCS, стр. 736-747. ACM, (2012)What the App is That? Deception and Countermeasures in the Android User Interface., , , , , и . IEEE Symposium on Security and Privacy, стр. 931-948. IEEE Computer Society, (2015)Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection., , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2014)Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , и . NDSS, The Internet Society, (2014)Hybrid Post-Quantum Signatures in Hardware Security Keys., , , , , , , , и . IACR Cryptol. ePrint Arch., (2022)Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning., , , , , и . CoRR, (2023)Understanding the Mirai Botnet., , , , , , , , , и 9 other автор(ы). USENIX Security Symposium, стр. 1093-1110. USENIX Association, (2017)Ten Years of iCTF: The Good, The Bad, and The Ugly., , , , , , , и . 3GSE, USENIX Association, (2014)