From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unknown malcode detection via text categorization and the imbalance problem., , , , и . ISI, стр. 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , и . ISI, стр. 267-268. IEEE, (2008)Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries., , , и . JISIC, стр. 152-159. IEEE, (2014)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , и . SSS, том 6976 из Lecture Notes in Computer Science, стр. 223-237. Springer, (2011)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , и . TrustCom/BigDataSE, стр. 522-529. IEEE, (2019)BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness., , и . CoRR, (2020)Speaker-to-speaker covert ultrasonic communication., , и . J. Inf. Secur. Appl., (2020)Securing Android-Powered Mobile Devices Using SELinux., , и . IEEE Secur. Priv., 8 (3): 36-44 (2010)Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs., , , , , и . DASFAA (1), том 10827 из Lecture Notes in Computer Science, стр. 342-351. Springer, (2018)A decision-theoretic approach to data mining., и . IEEE Trans. Syst. Man Cybern. Part A, 33 (1): 42-51 (2003)