From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions., , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 859-876. Springer, (2012)Automated identification of sensitive data from implicit user specification., и . Cybersecurity, 1 (1): 13 (2018)Automated Identification of Sensitive Data via Flexible User Requirements., и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 151-171. Springer, (2018)Automatically Identifying Trigger-based Behavior in Malware., , , , , и . Botnet Detection, том 36 из Advances in Information Security, Springer, (2008)Immunizing Servers from Buffer-Overflow Attacks, , и . Adaptive and Resilient Computing Security Workshop, (ноября 2004)Expanding Malware Defense by Securing Software Installations., , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 164-185. Springer, (2008)Scrutinizing Implementations of Smart Home Integrations., , , , , , и . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Golden implementation driven software debugging., , , и . SIGSOFT FSE, стр. 177-186. ACM, (2010)Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis., , , , и . NDSS, The Internet Society, (2012)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 245-256. Springer, (2014)