From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guest Editorial: Introduction to the Special Section.. IEEE Trans. Software Eng., 22 (1): 3-5 (1996)Software diversity: use of diversity as a defense mechanism.. NSPW, стр. 19-20. ACM, (2005)Chaffing at the Bit: Thoughts on a Note by Ronald Rivest.. Information Hiding, том 1768 из Lecture Notes in Computer Science, стр. 395-404. Springer, (1999)Virtual Career Advisor System., , , , и . MobiWIS, том 13977 из Lecture Notes in Computer Science, стр. 264-277. Springer, (2023)Toward Efficient Querying of Compressed Network Payloads., , , и . USENIX Annual Technical Conference, стр. 113-124. USENIX Association, (2012)Coding for a Believable Specification to Implementation Mapping., и . S&P, стр. 140-149. IEEE Computer Society, (1987)A Human Capital Model for Mitigating Security Analyst Burnout., , , , , , и . SOUPS, стр. 347-359. USENIX Association, (2015)Secure group management in large distributed systems: what is a group and what does it do?, и . NSPW, стр. 80-85. ACM, (1999)Cuckoo bags for exploring multikey data., , и . CSIIRW, стр. 18. ACM, (2010)An Anthropological Approach to Studying CSIRTs., , , , и . IEEE Secur. Priv., 12 (5): 52-60 (2014)