From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving cybersecurity hygiene through JIT patching., и . ESEC/SIGSOFT FSE, стр. 1421-1432. ACM, (2020)Detecting Malicious Exploit Kits using Tree-based Similarity Searches., , , , , , и . CODASPY, стр. 255-266. ACM, (2016)Cross-Stack Threat Sensing for Cyber Security and Resilience., , , и . DSN Workshops, стр. 18-21. IEEE Computer Society, (2018)Evaluating Feature Robustness for Windows Malware Family Classification., , , и . ICCCN, стр. 1-10. IEEE, (2022)Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization., , , и . SP, стр. 4554-4572. IEEE, (2024)Dressed up: Baiting Attackers through Endpoint Service Projection., , , и . SDN-NFV@CODASPY, стр. 23-28. ACM, (2018)Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire., , , и . NDSS, The Internet Society, (2016)Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files., , , и . CCWC, стр. 745-751. IEEE, (2022)Toward Efficient Querying of Compressed Network Payloads., , , и . USENIX ATC, стр. 113-124. USENIX Association, (2012)Using Context to Improve Network-based Exploit Kit Detection.. University of North Carolina, Chapel Hill, USA, (2016)base-search.net (ftcarolinadr:cdr.lib.unc.edu:dz010q790).