From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles., , , , и . ICDCS, стр. 642-652. IEEE Computer Society, (2015)Heimdall: Mitigating the Internet of Insecure Things., , , и . IEEE Internet of Things Journal, 4 (4): 968-978 (2017)DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices., , , и . NSS, том 9408 из Lecture Notes in Computer Science, стр. 112-129. Springer, (2015)Marlin: Mitigating Code Reuse Attacks Using Code Randomization., , , и . IEEE Trans. Dependable Secur. Comput., 12 (3): 326-337 (2015)