From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DexHunter: Toward Extracting Hidden Code from Packed Android Applications., , и . ESORICS (2), том 9327 из Lecture Notes in Computer Science, стр. 293-311. Springer, (2015)Randomized Security Patrolling for Link Flooding Attack Detection., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 17 (4): 795-812 (2020)RootGuard: Protecting Rooted Android Phones., , и . Computer, 47 (6): 32-40 (2014)Speeding Up Multi-level Route Analysis Through Improved Multi-LCS Algorithm., , , и . TRIDENTCOM, том 137 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 327-337. Springer, (2014)A Framework and DataSet for Bugs in Ethereum Smart Contracts., , и . ICSME, стр. 139-150. IEEE, (2020)QDASH: a QoE-aware DASH system., , , и . MMSys, стр. 11-22. ACM, (2012)Novel Approaches to End-to-End Packet Reordering Measurement., и . Internet Measurement Conference, стр. 227-238. USENIX Association, (2005)I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing., , , , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2016)On generalized low-rate denial-of-quality attack against Internet services., , , и . IWQoS, стр. 1-5. IEEE, (2009)Flow level detection and filtering of low-rate DDoS., , , , и . Comput. Networks, 56 (15): 3417-3431 (2012)