From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud., , и . AsiaCCS, стр. 317-328. ACM, (2014)Cherub: Fine-grained application protection with on-demand virtualization., , , и . Comput. Math. Appl., 65 (9): 1326-1338 (2013)SecureBus: towards application-transparent trusted computing with mandatory access control., , , и . AsiaCCS, стр. 117-126. ACM, (2007)Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing., , , и . Concurr. Comput. Pract. Exp., 22 (13): 1893-1910 (2010)Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms., , , и . MOBILWARE, том 48 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 161-174. Springer, (2010)PBDM: a flexible delegation model in RBAC., , и . SACMAT, стр. 149-157. ACM, (2003)Exploitation and threat analysis of open mobile devices., , , и . ANCS, стр. 20-29. ACM, (2009)A general obligation model and continuity: enhanced policy enforcement engine for usage control., , , , и . SACMAT, стр. 123-132. ACM, (2008)Federated Compositional Deep AUC Maximization., , , , и . CoRR, (2023)Botnet with Browser Extensions., , и . SocialCom/PASSAT, стр. 1089-1094. IEEE Computer Society, (2011)