From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using domain knowledge for ontology-guided entity extraction from noisy, unstructured text data., , , и . AND, стр. 101-106. ACM, (2009)From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System., , , , , и . IEEE Trans. Mob. Comput., 13 (1): 216-229 (2014)A Patch for Postel's Robustness Principle., , и . IEEE Secur. Priv., 10 (2): 87-91 (2012)Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code., и . WOOT, стр. 91-102. USENIX Association, (2011)Implementing a vertically hardened DNP3 control stack for power applications., , , , , , и . ICSS, стр. 45-53. ACM, (2016)The Bugs We Have to Kill., , и . login Usenix Mag., (2015)Domain-specific entity extraction from noisy, unstructured data using ontology-guided search., , , , и . Int. J. Document Anal. Recognit., 14 (2): 201-211 (2011)Teaching the principles of the hacker curriculum to undergraduates., , и . SIGCSE, стр. 122-126. ACM, (2010)Backhoe, a Packet Trace and Log Browser., , , и . VizSEC, том 5210 из Lecture Notes in Computer Science, стр. 152-160. Springer, (2008)Semi-supervised Data Organization for Interactive Anomaly Analysis., , и . ICMLA, стр. 55-62. IEEE Computer Society, (2006)