From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnus: Visual Vulnerability Analysis for Network Security., , , , и . IEEE Trans. Vis. Comput. Graph., 25 (1): 183-192 (2019)Guess What I Want: I am in Hurry and I am Using my Phone while Driving., , , и . IV, стр. 139-144. IEEE Computer Society, (2018)CRUMBS: A cyber security framework browser., , и . VizSEC, стр. 1-8. IEEE Computer Society, (2017)CrossWidget: a D3.js Plugin to Support Multiple Scented Cross Filtering Activities., , и . EuroVis (Posters), стр. 1-3. Eurographics Association, (2019)MAD: A visual analytics solution for Multi-step cyber Attacks Detection., , , , и . J. Comput. Lang., (2019)The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics., , , , и . VizSEC, стр. 1-8. IEEE Computer Society, (2017)ROPMate: Visually Assisting the Creation of ROP-based Exploits., , , , , , , и . VizSEC, стр. 1-8. IEEE, (2018)An Attack Graph-based On-line Multi-step Attack Detector., , , , , и . ICDCN, стр. 40:1-40:10. ACM, (2018)Effectiveness Error: Measuring and Improving RadViz Visual Effectiveness., , , , и . IEEE Trans. Vis. Comput. Graph., 28 (12): 4770-4786 (2022)SymNav: Visually Assisting Symbolic Execution., , , , , , , , и . VizSEC, стр. 1-11. IEEE, (2019)