From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

G-Free: defeating return-oriented programming through gadget-less binaries., , , , и . ACSAC, стр. 49-58. ACM, (2010)A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments., , и . ACM Trans. Priv. Secur., 26 (2): 16:1-16:30 (мая 2023)Unsupervised Detection and Clustering of Malicious TLS Flows., , , , и . CoRR, (2021)Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises., , , и . NDSS, The Internet Society, (2019)Domain and Website Attribution beyond WHOIS., , , , и . ACSAC, стр. 124-137. ACM, (2023)How Did That Get In My Phone? Unwanted App Distribution on Android Devices., , и . SP, стр. 53-69. IEEE, (2021)SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap., , и . SP, стр. 1367-1383. IEEE, (2020)Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks., , , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 3-24. Springer, (2015)Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis., , , , и . ACSAC, стр. 129-138. ACM, (2012)How Did That Get In My Phone? Unwanted App Distribution on Android Devices., , и . CoRR, (2020)