From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SoK: Cryptojacking Malware., , , , и . EuroS&P, стр. 120-139. IEEE, (2021)Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems., , и . DSN, стр. 443-454. IEEE Computer Society, (2016)FIRE: FInding Rogue nEtworks., , , , и . ACSAC, стр. 231-240. IEEE Computer Society, (2009)Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working., , , , и . WETICE, стр. 23-28. IEEE Computer Society, (2002)The Evolution of an Organizational Web Site: Migrating to XML/XSL., , , , и . WSE, стр. 62-69. IEEE Computer Society, (2001)Static analysis for detecting taint-style vulnerabilities in web applications., , и . J. Comput. Secur., 18 (5): 861-907 (2010)Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries., , , , , и . J. Comput. Secur., 17 (3): 305-329 (2009)EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis., , , и . NDSS, The Internet Society, (2011)A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication., , , и . NDSS, The Internet Society, (2013)GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , и . SANER, стр. 307-317. IEEE, (2021)