From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Control of system calls from outside of virtual machines., , и . SAC, стр. 2116-1221. ACM, (2008)Load-based covert channels between Xen virtual machines., и . SAC, стр. 173-180. ACM, (2010)Identifying Useful Features for Malware Detection in the Ember Dataset., , и . CANDAR Workshops, стр. 360-366. IEEE, (2019)Trends of anti-analysis operations of malwares observed in API call logs.. J. Comput. Virol. Hacking Tech., 14 (1): 69-85 (2018)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , и 4 other автор(ы). VEE, стр. 121-130. ACM, (2009)A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface., , , , , , , , , и 39 other автор(ы). ISSCC, стр. 130-132. IEEE, (2022)MobileScope: A Programming Language with Objective Mobility., , , и . ICDCS Workshops, стр. 542-547. IEEE Computer Society, (2004)Skipping Sleeps in Dynamic Analysis of Multithreaded Malware.. DSC, стр. 1-8. IEEE, (2018)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , и . AISec@CCS, стр. 55-56. ACM, (2017)How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement.. DIMVA, том 11543 из Lecture Notes in Computer Science, стр. 197-218. Springer, (2019)