From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authentication via Keystroke Dynamics., и . ACM Conference on Computer and Communications Security, стр. 48-56. ACM, (1997)Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens., , , и . NSPW, стр. 25-38. ACM, (2014)Worm evolution tracking via timing analysis., , и . WORM, стр. 52-59. ACM Press, (2005)SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks., , , и . USENIX Security Symposium, USENIX Association, (2011)Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis., , и . NDSS, The Internet Society, (2009)Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing., , и . USENIX Security Symposium, USENIX Association, (2006)SoK: Security Evaluation of Home-Based IoT Deployments., , , и . IEEE Symposium on Security and Privacy, стр. 1362-1380. IEEE, (2019)Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks., , , , , , и . EuroS&P, стр. 167-182. IEEE, (2018)My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging., , , и . HotBots, USENIX Association, (2007)Privacy-preserving global customization., , , , и . EC, стр. 176-184. ACM, (2000)