From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The modified compression-field theory for reinforced concrete elements subjected to shear., и . ACI Journal, 83 (2): 219--231 (1986)A Model for Opportunistic Network Exploits: The Case of P2P Worms., , и . WEIS, (2006)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , и . NDSS, The Internet Society, (2007)Testing metrics for password creation policies by attacking large sets of revealed passwords., , , и . ACM Conference on Computer and Communications Security, стр. 162-175. ACM, (2010)The response of reinforced concrete to in-plane shear and normal stresses, и . University of Toronto, Dept. of Civil Engineering, (марта 1982)PSI: Precise Security Instrumentation for Enterprise Networks., , , , и . NDSS, The Internet Society, (2017)An Empirical Analysis of Target-Resident DoS Filters., и . S&P, стр. 103-114. IEEE Computer Society, (2004)Creating Shared Information Spaces to Support Collaborative Design Work., , , , , и . Inf. Syst. Frontiers, 3 (3): 377-392 (2001)More Netflow Tools for Performance and Security., , , , и . LISA, стр. 121-132. USENIX, (2004)Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors., и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2006)