From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Randomized Security Patrolling for Link Flooding Attack Detection., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 17 (4): 795-812 (2020)A Framework and DataSet for Bugs in Ethereum Smart Contracts., , и . ICSME, стр. 139-150. IEEE, (2020)Aeolus: Distributed Execution of Permissioned Blockchain Transactions via State Sharding., , , , , , , , и . IEEE Trans. Ind. Informatics, 18 (12): 9227-9238 (2022)Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review., , , , , , и . IEEE Trans. Software Eng., 48 (10): 4181-4213 (2022)EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum., , , , , , , и . CoRR, (2020)STor: Social Network based Anonymous Communication in Tor, , , и . CoRR, (2011)Characterizing and Detecting WebAssembly Runtime Bugs., , , , , , , , и . CoRR, (2023)Novel Approaches to End-to-End Packet Reordering Measurement., и . Internet Measurement Conference, стр. 227-238. USENIX Association, (2005)I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing., , , , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2016)On generalized low-rate denial-of-quality attack against Internet services., , , и . IWQoS, стр. 1-5. IEEE, (2009)