From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution., , , и . IEICE Trans. Commun., 93-B (5): 1122-1130 (2010)Investigation and analysis of malware on websites., , , и . WSE, стр. 73-81. IEEE Computer Society, (2010)Scalable Detection of SIP Fuzzing Attacks., и . SECURWARE, стр. 114-119. IEEE Computer Society, (2008)Controlling malware HTTP communications in dynamic analysis system using search engine., , , и . CSS, стр. 1-6. IEEE, (2011)Life-cycle monitoring scheme of malware download sites for websites., , , и . SOCA, стр. 1-6. IEEE Computer Society, (2010)Memory behavior-based automatic malware unpacking in stealth debugging environment., , и . MALWARE, стр. 39-46. IEEE Computer Society, (2010)Virtual smartphone over IP., и . WOWMOM, стр. 1-6. IEEE Computer Society, (2010)Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme., , , и . IEICE Trans. Commun., 94-B (5): 1339-1347 (2011)Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks., , , , и . IEICE Trans. Commun., 93-B (5): 1131-1139 (2010)Using Call Patterns to Detect Unwanted Communication Callers., , и . SAINT, стр. 64-70. IEEE Computer Society, (2009)